It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnome-shell | Gnome | 3.15.91 (including) | 3.30.3 (excluding) |
Gnome-shell | Gnome | 3.31.0 (including) | 3.31.5 (excluding) |