Thoughts on the Systemd Root Exploit

from blog Andrew Ayer - Blog, | ↗ original
Sebastian Krahmer of the SUSE Security Team has discovered a local root exploit in systemd v228. A local user on a system running systemd v228 can escalate to root privileges. That's bad. At a high level, the exploit is trivial: Systemd uses -1 to represent an invalid mode_t (filesystem permissions) value. Systemd was accidentally passing this value to...