Markus Laire,
Yes, the bug is exploitable even with full disk encryption. Among other things, 
if there's an open instant messaging app, an attacker can send a message which 
would appear as if it was sent by the authenticated user.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1777415

Title:
  Local authorization bypass by using suspend mode

Status in Unity:
  New
Status in pam package in Ubuntu:
  New
Status in unity package in Ubuntu:
  Confirmed

Bug description:
  Version: Ubuntu 16.04.04 LTS Desktop, all packets are updated at 15.06.2018
  Affects: access to latest user opened applications, that can contain 
sensitive information (documents, private information, passwords, etc.)
  How to reproduce:
  1. open some applications (LibreOffice, browsers, editors, ...)
  2. go to suspend mode
  3. extract hard drive
  4. wake up
  5. after that can be several behaviors:
   * Ubuntu show lock screen. Enter ANY password -> access granted.
   * Ubuntu show lock screen. Enter ANY password, access denied. Fast press the 
hardware shutdown button -> access granted.
   * Ubuntu does not show lock screen, only black screen. We can repeat actions 
like in previous paragraphs

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity/+bug/1777415/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to