CVE-2021-20315

Source
https://ubuntu.com/security/CVE-2021-20315
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-20315.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-20315
Published
2022-02-18T18:15:00Z
Modified
2022-02-18T18:15:00Z
Downstream
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gnome-shell

Package

Name
gnome-shell
Purl
pkg:deb/ubuntu/gnome-shell

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.16.4-0ubuntu1
3.18.1-1ubuntu1
3.18.2-0ubuntu1
3.18.2-0ubuntu2
3.18.3-3ubuntu1
3.18.4-0ubuntu1
3.18.4-0ubuntu2
3.18.4-0ubuntu3
3.18.5-0ubuntu0.1
3.18.5-0ubuntu0.2
3.18.5-0ubuntu0.3