Misconfiguration is possible in any software. It's not specific to sysvinit or systemd-init. Selinux was created to solve this.
I deleted it. No need for two almost identical posts to exist.
Compare it to vulnerabilities found in SysVinit, which was as common as systemd-init is now. There were no similar bugs, that would allow crashing an entire system just by executing a single command.
Because they don't execute million lines super thoroughly checked shell code or why exactly? Without any explanation total FUD.
Because they are not merged with journaling system, job scheduler and watchdog. More features→more attack surface.
Again, more attack surface does not mean anything, to add to that example most people use the precompiled kernel that comes with their distro instead of compiling a leaner one to diminish attack surface, because that's irrelevant.
Most people also don't use selinux or apparmor, compile the kernel with -ftrivial-auto-var-init=zero and verify downloaded files using pgp signatures. But it doesn't mean these things are irrelevant. Even your phone has selinux=enforced option set. Why do you think your pc is not worth it?
What an average Mint user gains from systemd? A bit slower boot time? A bit more ram used? 50mb heavier system updates? What problems systemd solves? I use systemd, runit and openrc on different machines and I don't face any significant problems.
It doesn't, that's ridiculous, several distros don't use systemd and still have udev
Void uses eudev. Alpine uses eudev. Gentoos uses udev with patches. What non-systemd distros use vanilla udev?
Why do we invent new DEs instead of making proper settings app in already existing ones?