vulnerability
Red Hat: CVE-2019-3825: CVE-2019-3825 gdm: lock screen bypass when timed login is enabled (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Feb 6, 2019 | Apr 29, 2020 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 6, 2019
Added
Apr 29, 2020
Modified
Mar 27, 2026
Description
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
Solutions
redhat-upgrade-accountsserviceredhat-upgrade-accountsservice-debuginforedhat-upgrade-accountsservice-debugsourceredhat-upgrade-accountsservice-develredhat-upgrade-accountsservice-libsredhat-upgrade-accountsservice-libs-debuginforedhat-upgrade-appstream-dataredhat-upgrade-baobabredhat-upgrade-baobab-debuginforedhat-upgrade-baobab-debugsourceredhat-upgrade-clutterredhat-upgrade-clutter-debuginforedhat-upgrade-clutter-debugsourceredhat-upgrade-clutter-develredhat-upgrade-clutter-docredhat-upgrade-clutter-tests-debuginforedhat-upgrade-evinceredhat-upgrade-evince-browser-pluginredhat-upgrade-evince-browser-plugin-debuginforedhat-upgrade-evince-debuginforedhat-upgrade-evince-debugsourceredhat-upgrade-evince-libsredhat-upgrade-evince-libs-debuginforedhat-upgrade-evince-nautilusredhat-upgrade-evince-nautilus-debuginforedhat-upgrade-gdmredhat-upgrade-gdm-debuginforedhat-upgrade-gdm-debugsourceredhat-upgrade-gjsredhat-upgrade-gjs-debuginforedhat-upgrade-gjs-debugsourceredhat-upgrade-gjs-develredhat-upgrade-gjs-tests-debuginforedhat-upgrade-gnome-boxesredhat-upgrade-gnome-boxes-debuginforedhat-upgrade-gnome-boxes-debugsourceredhat-upgrade-gnome-control-centerredhat-upgrade-gnome-control-center-debuginforedhat-upgrade-gnome-control-center-debugsourceredhat-upgrade-gnome-control-center-filesystemredhat-upgrade-gnome-menusredhat-upgrade-gnome-menus-debuginforedhat-upgrade-gnome-menus-debugsourceredhat-upgrade-gnome-menus-develredhat-upgrade-gnome-online-accountsredhat-upgrade-gnome-online-accounts-debuginforedhat-upgrade-gnome-online-accounts-debugsourceredhat-upgrade-gnome-online-accounts-develredhat-upgrade-gnome-remote-desktopredhat-upgrade-gnome-remote-desktop-debuginforedhat-upgrade-gnome-remote-desktop-debugsourceredhat-upgrade-gnome-sessionredhat-upgrade-gnome-session-debuginforedhat-upgrade-gnome-session-debugsourceredhat-upgrade-gnome-session-wayland-sessionredhat-upgrade-gnome-session-xsessionredhat-upgrade-gnome-settings-daemonredhat-upgrade-gnome-settings-daemon-debuginforedhat-upgrade-gnome-settings-daemon-debugsourceredhat-upgrade-gnome-shellredhat-upgrade-gnome-shell-debuginforedhat-upgrade-gnome-shell-debugsourceredhat-upgrade-gnome-softwareredhat-upgrade-gnome-software-debuginforedhat-upgrade-gnome-software-debugsourceredhat-upgrade-gnome-software-editorredhat-upgrade-gnome-software-editor-debuginforedhat-upgrade-gnome-terminalredhat-upgrade-gnome-terminal-debuginforedhat-upgrade-gnome-terminal-debugsourceredhat-upgrade-gnome-terminal-nautilusredhat-upgrade-gnome-terminal-nautilus-debuginforedhat-upgrade-gnome-tweaksredhat-upgrade-gsettings-desktop-schemasredhat-upgrade-gsettings-desktop-schemas-develredhat-upgrade-gtk-update-icon-cacheredhat-upgrade-gtk-update-icon-cache-debuginforedhat-upgrade-gtk3redhat-upgrade-gtk3-debuginforedhat-upgrade-gtk3-debugsourceredhat-upgrade-gtk3-develredhat-upgrade-gtk3-devel-debuginforedhat-upgrade-gtk3-immodule-ximredhat-upgrade-gtk3-immodule-xim-debuginforedhat-upgrade-gtk3-immodules-debuginforedhat-upgrade-gtk3-tests-debuginforedhat-upgrade-gvfsredhat-upgrade-gvfs-afcredhat-upgrade-gvfs-afc-debuginforedhat-upgrade-gvfs-afpredhat-upgrade-gvfs-afp-debuginforedhat-upgrade-gvfs-archiveredhat-upgrade-gvfs-archive-debuginforedhat-upgrade-gvfs-clientredhat-upgrade-gvfs-client-debuginforedhat-upgrade-gvfs-debuginforedhat-upgrade-gvfs-debugsourceredhat-upgrade-gvfs-develredhat-upgrade-gvfs-fuseredhat-upgrade-gvfs-fuse-debuginforedhat-upgrade-gvfs-goaredhat-upgrade-gvfs-goa-debuginforedhat-upgrade-gvfs-gphoto2redhat-upgrade-gvfs-gphoto2-debuginforedhat-upgrade-gvfs-mtpredhat-upgrade-gvfs-mtp-debuginforedhat-upgrade-gvfs-smbredhat-upgrade-gvfs-smb-debuginforedhat-upgrade-librawredhat-upgrade-libraw-debuginforedhat-upgrade-libraw-debugsourceredhat-upgrade-libraw-develredhat-upgrade-libraw-samples-debuginforedhat-upgrade-libvncserverredhat-upgrade-libvncserver-debuginforedhat-upgrade-libvncserver-debugsourceredhat-upgrade-libvncserver-develredhat-upgrade-libxsltredhat-upgrade-libxslt-debuginforedhat-upgrade-libxslt-debugsourceredhat-upgrade-libxslt-develredhat-upgrade-mozjs52redhat-upgrade-mozjs52-debuginforedhat-upgrade-mozjs52-debugsourceredhat-upgrade-mozjs52-develredhat-upgrade-mozjs52-devel-debuginforedhat-upgrade-mozjs60redhat-upgrade-mozjs60-debuginforedhat-upgrade-mozjs60-debugsourceredhat-upgrade-mozjs60-develredhat-upgrade-mutterredhat-upgrade-mutter-debuginforedhat-upgrade-mutter-debugsourceredhat-upgrade-mutter-develredhat-upgrade-mutter-tests-debuginforedhat-upgrade-nautilusredhat-upgrade-nautilus-debuginforedhat-upgrade-nautilus-debugsourceredhat-upgrade-nautilus-develredhat-upgrade-nautilus-extensionsredhat-upgrade-nautilus-extensions-debuginforedhat-upgrade-valaredhat-upgrade-vala-debuginforedhat-upgrade-vala-debugsourceredhat-upgrade-vala-develredhat-upgrade-valadoc-debuginforedhat-upgrade-vinagreredhat-upgrade-vinagre-debuginforedhat-upgrade-vinagre-debugsource
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.