CVE-2019-3825
Publication date 6 February 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
Status
Package | Ubuntu Release | Status |
---|---|---|
gdm3 | 24.10 oracular |
Fixed 3.31.4+git20190225-1ubuntu1
|
24.04 LTS noble |
Fixed 3.31.4+git20190225-1ubuntu1
|
|
22.04 LTS jammy |
Fixed 3.31.4+git20190225-1ubuntu1
|
|
20.04 LTS focal |
Fixed 3.31.4+git20190225-1ubuntu1
|
|
18.04 LTS bionic |
Fixed 3.28.3-0ubuntu18.04.4
|
|
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Not in release |
Patch details
Package | Patch details |
---|---|
gdm3 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.4 · Medium |
Attack vector | Physical |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3892-1
- GDM vulnerability
- 20 February 2019