CVE-2019-3844

Priority
Description
It was discovered that a systemd service that uses DynamicUser property can
get new privileges through the execution of SUID binaries, which would
allow to create binaries owned by the service transient group with the
setgid bit set. A local attacker may use this flaw to access resources that
will be owned by a potentially different service in the future, when the
GID will be recycled.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (237-3ubuntu10.38)
Ubuntu 19.10 (Eoan Ermine):not-affected (242-7ubuntu3.2)
Ubuntu 20.04 (Focal Fossa):not-affected (244.1-0ubuntu2)
Patches:
Upstream:https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba
More Information

Updated: 2020-02-05 18:15:19 UTC (commit 1ebdd381034966b617b2f0962b7d8237bb2694ea)