vulnerability
Oracle Linux: CVE-2018-16888: ELSA-2019-2091: systemd security, bug fix, and enhancement update (MODERATE)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:M/Au:N/C:N/I:N/A:P) | Aug 17, 2017 | Jul 21, 2020 | Dec 3, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:P)
Published
Aug 17, 2017
Added
Jul 21, 2020
Modified
Dec 3, 2025
Description
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes.
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes.
Solutions
oracle-linux-upgrade-libgudev1oracle-linux-upgrade-libgudev1-develoracle-linux-upgrade-systemdoracle-linux-upgrade-systemd-develoracle-linux-upgrade-systemd-journal-gatewayoracle-linux-upgrade-systemd-libsoracle-linux-upgrade-systemd-networkdoracle-linux-upgrade-systemd-pythonoracle-linux-upgrade-systemd-resolvedoracle-linux-upgrade-systemd-sysv
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.