Skip to content
Commit 02d6b1cb authored by Markus Koschany's avatar Markus Koschany
Browse files

CVE-2018-16888,systemd: Mark as no-dsa for Jessie.

This is arguably a longstanding bug in the PID file logic and systemd is now
stricter when a PID file is owned by an untrusted user. Since daemons and
services in Debian are not untrusted, you would need some other vulnerability to
exploit it and to be able to write into the PID file. In most circumstances PID
files are writable only by root though.

Given there were a lot of code changes, a backport does not seem to be
proportionate at the moment.

Feedback from other team members or the security team would be appreciated
though.
parent 3f768524
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment