From secunia security advisory at $URL: Description: The weakness is caused due to the systemd-logind component insecurely creating a X11 session file (/run/user/<username>/X11/display) and can be exploited to create a symlink inside arbitrary directories. The weakness is reported in versions prior to 39. Solution Update to version 39 or later.
I see two solutions here. Either: a) mask older systemd versions (=> all systemd versions in tree will be hard-masked for one reason or other), b) backport a patch. Could you point to a specific commit in systemd git?
From Novell's bug tracker (https://bugzilla.novell.com/show_bug.cgi?id=747154): http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
(In reply to comment #1) > Could you point to a specific commit in systemd git? Btw, this issue is fixed in systemd-39. I guess you can backport it in our ~arch version.
Ah, it's in logind. I guess that would make only our -37 & -38 vulnerable. Will it be enough to drop the offending versions?
And removed.
Great, thank you. Closing noglsa.