USN-3938-1: systemd vulnerability

Publication date

8 April 2019

Overview

The systemd PAM module could be used to gain additional PolicyKit privileges.


Packages

  • systemd - system and service manager

Details

Jann Horn discovered that pam_systemd created logind sessions using some
parameters from the environment. A local attacker could exploit this in
order to spoof the active session and gain additional PolicyKit
privileges.

Jann Horn discovered that pam_systemd created logind sessions using some
parameters from the environment. A local attacker could exploit this in
order to spoof the active session and gain additional PolicyKit
privileges.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
18.10 cosmic libpam-systemd –  239-7ubuntu10.12
18.04 bionic libpam-systemd –  237-3ubuntu10.19
16.04 xenial libpam-systemd –  229-4ubuntu21.21
14.04 trusty libpam-systemd –  204-5ubuntu20.31

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›