A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.680Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3825

No data.

Status : Modified
Published: 2019-02-06T20:29:00.447
Modified: 2024-11-21T04:42:37.413
Link: CVE-2019-3825
