Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-20315

Опубликовано: 18 фев. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6
CVSS3: 6.1

Описание

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

focal

not-affected

hirsute

not-affected

trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

EPSS

Процентиль: 8%
0.00029
Низкий

3.6 Low

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
redhat
больше 4 лет назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
nvd
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

CVSS3: 6.1
debian
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-s ...

CVSS3: 6.1
github
почти 4 года назад

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

EPSS

Процентиль: 8%
0.00029
Низкий

3.6 Low

CVSS2

6.1 Medium

CVSS3