[manjaro-security] [ASA-202011-5] gdm: privilege escalation
Remi Gacogne
rgacogne at archlinux.org
Tue Nov 10 22:18:50 CET 2020
Arch Linux Security Advisory ASA-202011-5
=========================================
Severity: High
Date : 2020-11-10
CVE-ID : CVE-2020-16125
Package : gdm
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-1264
Summary
=======
The package gdm before version 3.38.2-1 is vulnerable to privilege
escalation.
Resolution
==========
Upgrade to 3.38.2-1.
# pacman -Syu "gdm>=3.38.2-1"
The problem has been fixed upstream in version 3.38.2.
Workaround
==========
None.
Description
===========
gdm before 3.38.2 can be tricked into launching gnome-initial-setup,
enabling an unprivileged user to create a new user account for
themselves. The new account is a member of the sudo group, so this
enables the unprivileged user to obtain admin privileges.
Impact
======
An unprivileged local user might be able to elevate privileges to root.
References
==========
https://gitlab.gnome.org/GNOME/gdm/-/issues/642
https://security.archlinux.org/CVE-2020-16125
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20201110/7aff6bd8/attachment-0001.sig>
More information about the manjaro-security
mailing list