CVE-2021-20315 — Improper Locking in Gnome-shell
Severity
6.1MEDIUMNVD
EPSS
0.0%
top 91.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18
Latest updateFeb 19
Description
A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
CVSS vector
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:HExploitability: 0.9 | Impact: 5.2
Affected Packages3 packages
🔴Vulnerability Details
3GHSA▶
GHSA-hpr5-wwh9-pjhf: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l↗2022-02-19
CVEList▶
CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l↗2022-02-18
OSV▶
CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window l↗2022-02-18