[sf-lug] systemd memory corruption...

Michael Paoli Michael.Paoli at cal.berkeley.edu
Thu Jan 10 20:01:52 PST 2019


P.S.

This might also leave some wondering if I run systemd.
The answer is: Yes, and no.  Or much more specifically:
On some hosts: Yes
On some hosts: ABSOLUTELY HELL F*CKIN' NO DAMN WAY!
It's good to have choices.  Even better within the same distro (Debian!).

> From: "Michael Paoli" <Michael.Paoli at cal.berkeley.edu>
> Subject: Re: [sf-lug] systemd memory corruption...
> Date: Thu, 10 Jan 2019 19:53:29 -0800

>> From: "Bobbie Sellers" <bliss-sf4ever at dslextreme.com>
>> Subject: [sf-lug] systemd memory corruption...
>> Date: Thu, 10 Jan 2019 13:41:09 -0800
>
>>     Not necessary but present in some systems.
>>     Read about it below.
>> <https://www.bleepingcomputer.com/news/security/linux-systemd-affected-by-memory-corruption-vulnerabilities-no-patches-yet/>
>
> Sounds like bug / security vulnerabilities in systemd ... at least one of
> which is network exploitable (whee!).  Yep, make systemd permeate
> everything, always running with all privileges, that way if there's a
> bug most anywhere, why let it be a mere bug when we can have it
> instead be a remote root exploit!  Uhm, yeah, about that ...
>
> Interesting bit though, ... you know, kernel updates,
> need to reboot to get the benefits (e.g. security fixes) of the
> new kernel, ... same for the init system, ... right? ... right?
>
> Well, for better and/or worse, systemd has a neat trick it can do.
> I can replace itself while it's running ... so yes, one can patch/upgrade
> the systemd init system(!) while it's running, and reap at least some of
> those benefits (maybe all of them - depending how fully it replaces any
> and all pieces that were running or still resident anywhere in RAM for
> such, etc.).
>
> The first time I learned of this ... uhm, yeah, ... a very ugly mess had
> systemd created in its overzealous attempt at such.  See, I was running
> Debian stable (or at least it was the stable then), had fairly recently
> upgraded to stable.  But systemd had given me lots of grief, so I was like
> screw that, boot ye olde init system (still all there).  That was all fine
> and dandy until ... regular security, etc. updates.  Included update(s)
> to systemd.  Well, even though the running init system wasn't systemd,
> systemd, in its overzealous stupidity, in having its software updated,
> would go and replace the running init (PID 1) with itself ... and most
> unfortunately, it didn't even bother to check what init system was
> currently running.  So, ... I had a host running sysvinit, where
> upgrade of a systemd package caused it to have the unconcerned brazenness
> to replace the running PID 1 without bothering to even determine if it
> was systemd.  Of course once that happened all hell broke loose immediately.
> Yes, that earned systemd a much more disabled configuration - so it would
> not make such stupid presumptions again ... nor would it have enough
> presence or power to even successfully make any such overbearing attempt.




More information about the sf-lug mailing list