It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://security.netapp.com/advisory/ntap-20190307-0007/ | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888 | patch third party advisory issue tracking |
https://access.redhat.com/errata/RHSA-2019:2091 | third party advisory vendor advisory |
https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74%40%3Cuser.cassandra.apache.org%3E | mailing list |
https://usn.ubuntu.com/4269-1/ | third party advisory vendor advisory |