Bugzilla – Bug 1124628
VUL-0: CVE-2019-3825: gdm: lock screen bypass when timed login is enabled
Last modified: 2024-05-07 09:24:18 UTC
rh#1672825 A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session. References: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825 https://bugzilla.redhat.com/show_bug.cgi?id=1672825 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3825 https://gitlab.gnome.org/GNOME/gdm/issues/460
Reproducible on SLE15 but not on SLE12, where from the code sessions only start conversation when created.
SUSE-SU-2019:0527-1: An update that solves one vulnerability and has 5 fixes is now available. Category: security (moderate) Bug References: 1112294,1112578,1113245,1113700,1120307,1124628 CVE References: CVE-2019-3825 Sources used: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): gdm-3.26.2.1-13.19.2 SUSE Linux Enterprise Module for Desktop Applications 15 (src): gdm-3.26.2.1-13.19.2
openSUSE-SU-2019:0310-1: An update that solves one vulnerability and has 5 fixes is now available. Category: security (moderate) Bug References: 1112294,1112578,1113245,1113700,1120307,1124628 CVE References: CVE-2019-3825 Sources used: openSUSE Leap 15.0 (src): gdm-3.26.2.1-lp150.11.9.1
All done, closing.