CVE-2019-3825
Summary
| CVE | CVE-2019-3825 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-02-06 20:29:00 UTC |
| Updated | 2019-10-09 23:49:00 UTC |
| Description | A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1672825 – (CVE-2019-3825) CVE-2019-3825 gdm: lock screen bypass when timed login is enabled |
CONFIRM |
bugzilla.redhat.com |
Exploit, Issue Tracking, Mitigation, Third Party Advisory |
| USN-3892-1: GDM vulnerability | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 377567 Alibaba Cloud Linux Security Update for gnome (ALINUX3-SA-2022:0108)
- 670289 EulerOS Security Update for gdm (EulerOS-SA-2021-1787)
- 670937 EulerOS Security Update for gdm (EulerOS-SA-2020-2546)
- 940175 AlmaLinux Security Update for GNOME (ALSA-2020:1766)
- 960387 Rocky Linux Security Update for GNOME (RLSA-2020:1766)