CVE-2019-3842 (retired)

Priority
Description
In systemd before v242-rc4, it was discovered that pam_systemd does not
properly sanitize the environment before using the XDG_SEAT variable. It is
possible for an attacker, in some particular configurations, to set a
XDG_SEAT environment variable which allows for commands to be checked
against polkit policies using the "allow_active" element rather than
"allow_any".
Package
Upstream:released (241-3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (204-5ubuntu20.31)
Ubuntu 16.04 LTS (Xenial Xerus):released (229-4ubuntu21.21)
Ubuntu 18.04 LTS (Bionic Beaver):released (237-3ubuntu10.19)
Ubuntu 18.10 (Cosmic Cuttlefish):released (239-7ubuntu10.12)
Ubuntu 19.04 (Disco Dingo):released (240-6ubuntu4)
Patches:
Upstream:https://github.com/systemd/systemd/commit/83d4ab55336ff8a0643c6aa627b31e351a24040a
More Information

Updated: 2019-04-15 12:14:55 UTC (commit c23350cfab6eced98d46d07afeedc729e3e089da)