First published: Wed Nov 04 2020(Updated: )
An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sddm | 0.18.0-1+deb10u1 0.19.0-3 0.19.0-5 0.20.0-1 | |
debian/sddm | <=0.18.1-1<=0.18.0-1 | 0.19.0-1 0.18.0-1+deb10u1 |
Sddm Project Sddm | <0.19.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28049 is a vulnerability discovered in SDDM before version 0.19.0 that incorrectly starts the X server in a way that allows local unprivileged users to access X server display contents without proper authentication.
CVE-2020-28049 has a severity value of 6.3, which is considered medium.
CVE-2020-28049 affects SDDM versions before 0.19.0 by allowing local unprivileged users to create a connection to the X server without proper authentication.
To fix CVE-2020-28049, it is recommended to update SDDM to version 0.19.0 or higher.
More information about CVE-2020-28049 can be found in the references provided: [1] [2] [3].