It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
2019-01-14T22:29:00.233
2024-11-21T03:53:32.423
Modified
CVSSv3.1: 4.7 (MEDIUM)
AV:L/AC:M/Au:N/C:N/I:N/A:P
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | systemd_project | systemd | < 237 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 19.10 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Application | netapp | active_iq_performance_analytics_services | - | Yes |
Application | netapp | element_software | - | Yes |