The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
Exploitability
AV:LAC:MAu:NImpact
C:NI:CA:C6.3/AV:L/AC:M/Au:N/C:N/I:C/A:C