A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://usn.ubuntu.com/3892-1/ | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825 | exploit mitigation third party advisory issue tracking |