CVE-2021-20315

Related Vulnerabilities: CVE-2021-20315  

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

Description

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

Statement

The flaw only affects some specific versions of CentOS Stream 8. This issue did not affect the versions of gnome-shell as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include the vulnerable code.

The flaw only affects some specific versions of CentOS Stream 8. This issue did not affect the versions of gnome-shell as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include the vulnerable code.

Mitigation

Disable enabled GNOME extensions, such as "Application menu" or "Window list".

Additional Information

  • Bugzilla 2006285: CVE-2021-20315 gnome-shell: locking protection bypass allow unauthorized user to kill existing applications or start new ones
  • CWE-862: Missing Authorization
  • FAQ: Frequently asked questions about CVE-2021-20315