CVE-2013-4392

Publication date 28 October 2013

Last updated 10 June 2025


Ubuntu priority

Cvss 3 Severity Score

5.0 · Medium

Score breakdown

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.

Read the notes from the security team

Status

Package Ubuntu Release Status
systemd 13.04 raring
Not affected
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Not in release

Notes


mdeslaur

this is likely in a systemd component we don't ship


sbeattie

it also is mitigated by hardlink protections

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
systemd

Severity score breakdown

Parameter Value
Base score 5.0 · Medium
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N