The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
X11-common | Debian | * | 1:7.6+12 (excluding) |
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Debian_linux | Debian | 9.0 (including) | 9.0 (including) |
Debian_linux | Debian | 10.0 (including) | 10.0 (including) |
Xorg | Ubuntu | artful | * |
Xorg | Ubuntu | cosmic | * |
Xorg | Ubuntu | disco | * |
Xorg | Ubuntu | eoan | * |
Xorg | Ubuntu | groovy | * |
Xorg | Ubuntu | hardy | * |
Xorg | Ubuntu | hirsute | * |
Xorg | Ubuntu | impish | * |
Xorg | Ubuntu | lucid | * |
Xorg | Ubuntu | maverick | * |
Xorg | Ubuntu | natty | * |
Xorg | Ubuntu | oneiric | * |
Xorg | Ubuntu | precise | * |
Xorg | Ubuntu | quantal | * |
Xorg | Ubuntu | raring | * |
Xorg | Ubuntu | saucy | * |
Xorg | Ubuntu | trusty | * |
Xorg | Ubuntu | upstream | * |
Xorg | Ubuntu | utopic | * |
Xorg | Ubuntu | vivid | * |
Xorg | Ubuntu | wily | * |
Xorg | Ubuntu | yakkety | * |
Xorg | Ubuntu | zesty | * |