vulnerability

CentOS Linux: CVE-2018-16888: Moderate: systemd security, bug fix, and enhancement update (CESA-2019:2091)

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:P)
Published
Jan 14, 2019
Added
Aug 28, 2019
Modified
May 25, 2023

Description

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.

Solution(s)

centos-upgrade-libgudev1centos-upgrade-libgudev1-develcentos-upgrade-systemdcentos-upgrade-systemd-debuginfocentos-upgrade-systemd-develcentos-upgrade-systemd-journal-gatewaycentos-upgrade-systemd-libscentos-upgrade-systemd-networkdcentos-upgrade-systemd-pythoncentos-upgrade-systemd-resolvedcentos-upgrade-systemd-sysv
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.