|Description||It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|systemd (PTS)||buster, buster (security)||241-7~deb10u8||fixed|
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
[stretch] - systemd <ignored> (Minor issue, too intrusive to backport)
[jessie] - systemd <no-dsa> (low priority because this is inherently a bug in the PID file logic, too intrusive to backport)
Upstream issue: https://github.com/systemd/systemd/issues/6632
Upstream patches: https://github.com/systemd/systemd/pull/7816