It exists that systemd incorrectly handled certain PIDFile files. A local attacker could possibly use this issue to trick systemd into killing privileged processes. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-16888)
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
systemd project systemd |
||
redhat enterprise linux 8.0 |
||
redhat openshift container platform 4.0 |
||
redhat discovery - |
||
redhat migration toolkit 1.0 |
||
redhat ceph storage 4.0 |
||
debian debian linux 9.0 |
Plus: SystemD has a privilege escalation flaw that needs patching, and more bits and bytes
Roundup Kaspersky has detailed its takedown of a massive so-called watering-hole attack appearing to target certain folks in China, in the top story in The Reg's infosec roundup that looks at issues of the past week beyond our own detailed coverage. The security firm said the operation, designed to target "more than 10 websites related to religion, voluntary programs, charity and several other areas," used sites set up to deliver backdoors primarily crafted from open source tools and GitHub repo...