[ASA-201903-3] gdm: access restriction bypass

Morten Linderud foxboron at archlinux.org
Mon Mar 4 08:54:40 UTC 2019


Arch Linux Security Advisory ASA-201903-3
=========================================

Severity: High
Date    : 2019-03-03
CVE-ID  : CVE-2019-3820 CVE-2019-3825
Package : gdm
Type    : access restriction bypass
Remote  : No
Link    : https://security.archlinux.org/AVG-879

Summary
=======

The package gdm before version 3.30.3-1 is vulnerable to access
restriction bypass.

Resolution
==========

Upgrade to 3.30.3-1.

# pacman -Syu "gdm>=3.30.3-1"

The problems have been fixed upstream in version 3.30.3.

Workaround
==========

None.

Description
===========

- CVE-2019-3820 (access restriction bypass)

A partial screen lock bypass via keybindings has been found in gdm <=
3.30.2, allowing a local attacker to unlock a session under certain
circumstances.

- CVE-2019-3825 (access restriction bypass)

An issue has been found in gdm <= 3.30.2, allowing a local attacker
with valid credentials to unlock the session for a different user than
their own.

Impact
======

A local attacker can unlock session if they have other valid
credentials, or under certain circumstances.

References
==========

https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825
https://gitlab.gnome.org/GNOME/gdm/issues/460
https://security.archlinux.org/CVE-2019-3820
https://security.archlinux.org/CVE-2019-3825
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190304/24ebbca2/attachment.sig>


More information about the arch-security mailing list