vulnerability

Red Hat: CVE-2019-3825: CVE-2019-3825 gdm: lock screen bypass when timed login is enabled (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 6, 2019
Added
Apr 29, 2020
Modified
Mar 27, 2026

Description

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.

Solutions

redhat-upgrade-accountsserviceredhat-upgrade-accountsservice-debuginforedhat-upgrade-accountsservice-debugsourceredhat-upgrade-accountsservice-develredhat-upgrade-accountsservice-libsredhat-upgrade-accountsservice-libs-debuginforedhat-upgrade-appstream-dataredhat-upgrade-baobabredhat-upgrade-baobab-debuginforedhat-upgrade-baobab-debugsourceredhat-upgrade-clutterredhat-upgrade-clutter-debuginforedhat-upgrade-clutter-debugsourceredhat-upgrade-clutter-develredhat-upgrade-clutter-docredhat-upgrade-clutter-tests-debuginforedhat-upgrade-evinceredhat-upgrade-evince-browser-pluginredhat-upgrade-evince-browser-plugin-debuginforedhat-upgrade-evince-debuginforedhat-upgrade-evince-debugsourceredhat-upgrade-evince-libsredhat-upgrade-evince-libs-debuginforedhat-upgrade-evince-nautilusredhat-upgrade-evince-nautilus-debuginforedhat-upgrade-gdmredhat-upgrade-gdm-debuginforedhat-upgrade-gdm-debugsourceredhat-upgrade-gjsredhat-upgrade-gjs-debuginforedhat-upgrade-gjs-debugsourceredhat-upgrade-gjs-develredhat-upgrade-gjs-tests-debuginforedhat-upgrade-gnome-boxesredhat-upgrade-gnome-boxes-debuginforedhat-upgrade-gnome-boxes-debugsourceredhat-upgrade-gnome-control-centerredhat-upgrade-gnome-control-center-debuginforedhat-upgrade-gnome-control-center-debugsourceredhat-upgrade-gnome-control-center-filesystemredhat-upgrade-gnome-menusredhat-upgrade-gnome-menus-debuginforedhat-upgrade-gnome-menus-debugsourceredhat-upgrade-gnome-menus-develredhat-upgrade-gnome-online-accountsredhat-upgrade-gnome-online-accounts-debuginforedhat-upgrade-gnome-online-accounts-debugsourceredhat-upgrade-gnome-online-accounts-develredhat-upgrade-gnome-remote-desktopredhat-upgrade-gnome-remote-desktop-debuginforedhat-upgrade-gnome-remote-desktop-debugsourceredhat-upgrade-gnome-sessionredhat-upgrade-gnome-session-debuginforedhat-upgrade-gnome-session-debugsourceredhat-upgrade-gnome-session-wayland-sessionredhat-upgrade-gnome-session-xsessionredhat-upgrade-gnome-settings-daemonredhat-upgrade-gnome-settings-daemon-debuginforedhat-upgrade-gnome-settings-daemon-debugsourceredhat-upgrade-gnome-shellredhat-upgrade-gnome-shell-debuginforedhat-upgrade-gnome-shell-debugsourceredhat-upgrade-gnome-softwareredhat-upgrade-gnome-software-debuginforedhat-upgrade-gnome-software-debugsourceredhat-upgrade-gnome-software-editorredhat-upgrade-gnome-software-editor-debuginforedhat-upgrade-gnome-terminalredhat-upgrade-gnome-terminal-debuginforedhat-upgrade-gnome-terminal-debugsourceredhat-upgrade-gnome-terminal-nautilusredhat-upgrade-gnome-terminal-nautilus-debuginforedhat-upgrade-gnome-tweaksredhat-upgrade-gsettings-desktop-schemasredhat-upgrade-gsettings-desktop-schemas-develredhat-upgrade-gtk-update-icon-cacheredhat-upgrade-gtk-update-icon-cache-debuginforedhat-upgrade-gtk3redhat-upgrade-gtk3-debuginforedhat-upgrade-gtk3-debugsourceredhat-upgrade-gtk3-develredhat-upgrade-gtk3-devel-debuginforedhat-upgrade-gtk3-immodule-ximredhat-upgrade-gtk3-immodule-xim-debuginforedhat-upgrade-gtk3-immodules-debuginforedhat-upgrade-gtk3-tests-debuginforedhat-upgrade-gvfsredhat-upgrade-gvfs-afcredhat-upgrade-gvfs-afc-debuginforedhat-upgrade-gvfs-afpredhat-upgrade-gvfs-afp-debuginforedhat-upgrade-gvfs-archiveredhat-upgrade-gvfs-archive-debuginforedhat-upgrade-gvfs-clientredhat-upgrade-gvfs-client-debuginforedhat-upgrade-gvfs-debuginforedhat-upgrade-gvfs-debugsourceredhat-upgrade-gvfs-develredhat-upgrade-gvfs-fuseredhat-upgrade-gvfs-fuse-debuginforedhat-upgrade-gvfs-goaredhat-upgrade-gvfs-goa-debuginforedhat-upgrade-gvfs-gphoto2redhat-upgrade-gvfs-gphoto2-debuginforedhat-upgrade-gvfs-mtpredhat-upgrade-gvfs-mtp-debuginforedhat-upgrade-gvfs-smbredhat-upgrade-gvfs-smb-debuginforedhat-upgrade-librawredhat-upgrade-libraw-debuginforedhat-upgrade-libraw-debugsourceredhat-upgrade-libraw-develredhat-upgrade-libraw-samples-debuginforedhat-upgrade-libvncserverredhat-upgrade-libvncserver-debuginforedhat-upgrade-libvncserver-debugsourceredhat-upgrade-libvncserver-develredhat-upgrade-libxsltredhat-upgrade-libxslt-debuginforedhat-upgrade-libxslt-debugsourceredhat-upgrade-libxslt-develredhat-upgrade-mozjs52redhat-upgrade-mozjs52-debuginforedhat-upgrade-mozjs52-debugsourceredhat-upgrade-mozjs52-develredhat-upgrade-mozjs52-devel-debuginforedhat-upgrade-mozjs60redhat-upgrade-mozjs60-debuginforedhat-upgrade-mozjs60-debugsourceredhat-upgrade-mozjs60-develredhat-upgrade-mutterredhat-upgrade-mutter-debuginforedhat-upgrade-mutter-debugsourceredhat-upgrade-mutter-develredhat-upgrade-mutter-tests-debuginforedhat-upgrade-nautilusredhat-upgrade-nautilus-debuginforedhat-upgrade-nautilus-debugsourceredhat-upgrade-nautilus-develredhat-upgrade-nautilus-extensionsredhat-upgrade-nautilus-extensions-debuginforedhat-upgrade-valaredhat-upgrade-vala-debuginforedhat-upgrade-vala-debugsourceredhat-upgrade-vala-develredhat-upgrade-valadoc-debuginforedhat-upgrade-vinagreredhat-upgrade-vinagre-debuginforedhat-upgrade-vinagre-debugsource
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.