CVE-2020-27837
Advisory lineage Upstream: 0 Downstream: 3
Modified
Published: 28 Dec 2020, 18:34
Last modified:04 Aug 2024, 16:25
Vulnerability Summary
Overall Risk (default)
medium
26/100 CVSS Score
6.4 MEDIUM
v3.1 (nvd)
EPSS Score
0.04% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
28 Dec 2020, 18:34
Published
Vulnerability first disclosed
04 Aug 2024, 16:25
Last Modified
Vulnerability information updated
Description
A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.4CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- v2.0•MEDIUM•Score: 4.4AV:L/AC:M/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 0.04%• Percentile: 13%
Techniques & Countermeasures
- CWE-362•Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Affected Systems
- gnome•gnome_display_manager
< 3.38.2.1