Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-20315

Опубликовано: 18 фев. 2022
Источник: debian
EPSS Низкий

Описание

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnome-shellnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2006285

EPSS

Процентиль: 8%
0.00029
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 5.7
redhat
больше 4 лет назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
nvd
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
github
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

EPSS

Процентиль: 8%
0.00029
Низкий