Generated remediation guidance and an executive summary. No account required.
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
Cite this page
CVE-2019-3842. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2019-3842
Use CWE-285, Systemd Project vendor hub and Systemd product page to widen CVE-2019-3842 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40224, CVE-2026-40226 and CVE-2026-40225 for nearby disclosures in the same product family.