First published: Tue Apr 09 2019(Updated: )
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | <=241 | |
Systemd Project Systemd | =242-rc1 | |
Systemd Project Systemd | =242-rc2 | |
Systemd Project Systemd | =242-rc3 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =30 | |
Debian Debian Linux | =8.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
<=241 | ||
=242-rc1 | ||
=242-rc2 | ||
=242-rc3 | ||
=7.0 | ||
=30 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3842 is a vulnerability in the systemd software that allows a local authenticated attacker to gain elevated privileges on the system.
In systemd before v242-rc4, pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable, allowing an attacker to set a malicious XDG_SEAT environment variable and execute commands with elevated privileges.
IBM Cloud Pak for Security (CP4S) versions 1.7.2.0, 1.7.1.0, and 1.7.0.0, as well as systemd version 241 and versions 242-rc1, 242-rc2, and 242-rc3 are affected by CVE-2019-3842.
CVE-2019-3842 has a severity level of 7, which is considered high.
Upgrade to systemd version v242-rc4 or a later version that includes the patch for CVE-2019-3842.