49
Timing Flaw in systemd Cleanup Enables Root Privilege Escalation
(cybersecurity88.com)
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
Yet another critical vulnerability in the much vaunted systemd has been exposed by a misbehaving app - in this case snapd.
Both need patching.
Nothing in the Qualys report nor the Ubuntu page for the CVE indicate that there is something to be fixed in systemd, only that you can create systemd-tmpfiles rules that will expose the vulnerability in snapd.
What do you think systemd-tmpfiles needs to do differently?
Read the bug in the systemd repo. meanwhile the systemd cultists will defend it to the death. Look, if you value the positive aspects of systemd but dislike the cancerous assimilation of the entire userland, dinit is a perfectly good option.