GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
References
Link | Resource |
---|---|
https://bugzilla.gnome.org/show_bug.cgi?id=737456 | Issue Tracking Vendor Advisory |
http://openwall.com/lists/oss-security/2014/09/29/17 | Mailing List Third Party Advisory |
https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013 | Issue Tracking Patch |
https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378 | Patch Issue Tracking |
http://rhn.redhat.com/errata/RHSA-2015-0535.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-12-25 13:59
Updated : 2016-08-31 08:08
NVD link : CVE-2014-7300
Mitre link : CVE-2014-7300
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
- enterprise_linux_server
gnome
- gnome-shell