A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "gdm3" }, { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "gdm3-dbgsym" }, { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "gir1.2-gdm-1.0" }, { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "libgdm-dev" }, { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "libgdm1" }, { "binary_version": "3.28.3-0ubuntu18.04.4", "binary_name": "libgdm1-dbgsym" } ] }