CVE-2021-20315Improper Locking in Gnome-shell

CWE-667Improper Locking6 documents6 sources
Severity
6.1MEDIUMNVD
EPSS
0.0%
top 91.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18
Latest updateFeb 19

Description

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:HExploitability: 0.9 | Impact: 5.2

Affected Packages3 packages

NVDgnome/gnome-shell< 3.32.2
CVEListV5gnome/gnome-shellgnome-shell 3.32.2-40.el8

🔴Vulnerability Details

3
GHSA
GHSA-hpr5-wwh9-pjhf: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l2022-02-19
CVEList
CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l2022-02-18
OSV
CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l2022-02-18

📋Vendor Advisories

2
Red Hat
gnome-shell: locking protection bypass allow unauthorized user to kill existing applications or start new ones2021-08-31
Debian
CVE-2021-20315: gnome-shell - A locking protection bypass flaw was found in some versions of gnome-shell as sh...2021
CVE-2021-20315 — Improper Locking in Gnome Gnome-shell | cvebase