CVE-2019-3842

Published: 08 April 2019

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

Priority

Medium

CVSS 3 base score: 7.0

Status

Package Release Status
systemd
Launchpad, Ubuntu, Debian
Upstream
Released (241-3)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (237-3ubuntu10.19)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (229-4ubuntu21.21)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (204-5ubuntu20.31)
Patches:
Upstream: https://github.com/systemd/systemd/commit/83d4ab55336ff8a0643c6aa627b31e351a24040a