3.6
CWE
264
Advisory Published
CVE Published
Updated

CVE-2012-1620

First published: Wed Feb 01 2012(Updated: )

<a href="https://bugs.gentoo.org/show_bug.cgi?id=401645">https://bugs.gentoo.org/show_bug.cgi?id=401645</a> Jeroen Roovers 2012-01-31 17:23:28 UTC 1) In a terminal, I run `slock &amp; sleep 5; &lt;some X app&gt;' 2) After about 10 seconds, I press some keys that slock would interpret as a password. 3a) It does not allow me to use &lt;some X app&gt; - all keyboard controls are captured. 3b) Pointer device input is blocked - &lt;some X app&gt; cannot be controlled through the mouse. 4) Entering the correct password unlocks the screen and makes &lt;some X app&gt; focused and in the foreground. The only harm I see here is a possible unwanted disclosure of the information that &lt;some X app&gt; happens to display at the time, but it's a vulnerability sure enough.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Suckless Slock=0.9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203