GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.gnome.org/show_bug.cgi?id=737456 | Issue Tracking Vendor Advisory | 
| http://openwall.com/lists/oss-security/2014/09/29/17 | Mailing List Third Party Advisory | 
| https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013 | Issue Tracking Patch | 
| https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378 | Patch Issue Tracking | 
| http://rhn.redhat.com/errata/RHSA-2015-0535.html | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Information
                Published : 2014-12-25 13:59
Updated : 2016-08-31 08:08
NVD link : CVE-2014-7300
Mitre link : CVE-2014-7300
JSON object : View
CWE
                
                    
                        
                        CWE-399
                        
            Resource Management Errors
Products Affected
                redhat
- enterprise_linux_desktop
 - enterprise_linux_hpc_node
 - enterprise_linux_workstation
 - enterprise_linux_server
 
gnome
- gnome-shell
 


