First published: Wed Feb 06 2019(Updated: )
Gnome gnome-shell lock screen could allow a physical attacker to bypass security restrictions, caused by the failure to properly restrict all contextual actions. By performing specially-crafted operations, an attacker could exploit this vulnerability to invoke certain keyboard shortcuts.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Data Risk Manager | <=2.0.6 | |
debian/gnome-shell | 3.38.6-1~deb11u2 43.9-0+deb12u2 47.3-1 | |
Ubuntu Yaru Theme for GNOME Shell | >=3.15.91<3.30.3 | |
Ubuntu Yaru Theme for GNOME Shell | >=3.31.0<3.31.5 | |
SUSE openSUSE | =15.0 | |
SUSE openSUSE | =15.1 | |
SUSE openSUSE | =42.3 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3820 has a medium severity rating due to its potential to allow physical attackers to bypass the lock screen security measures.
To fix CVE-2019-3820, update to the latest patched version of gnome-shell provided by your distribution.
CVE-2019-3820 affects gnome-shell versions prior to 3.30.3 and between 3.31.0 and 3.31.5.
CVE-2019-3820 affects multiple platforms, including various releases of Ubuntu, openSUSE, and Debian.
There is no official workaround for CVE-2019-3820, so upgrading to a secure version is recommended.