vulnerability
CentOS Linux: CVE-2018-16888: Moderate: systemd security, bug fix, and enhancement update (CESA-2019:2091)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:N/I:N/A:P) | Jan 14, 2019 | Aug 28, 2019 | May 25, 2023 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:P)
Published
Jan 14, 2019
Added
Aug 28, 2019
Modified
May 25, 2023
Description
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
Solution(s)
centos-upgrade-libgudev1centos-upgrade-libgudev1-develcentos-upgrade-systemdcentos-upgrade-systemd-debuginfocentos-upgrade-systemd-develcentos-upgrade-systemd-journal-gatewaycentos-upgrade-systemd-libscentos-upgrade-systemd-networkdcentos-upgrade-systemd-pythoncentos-upgrade-systemd-resolvedcentos-upgrade-systemd-sysv
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.