Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-7300

Опубликовано: 25 дек. 2014
Источник: ubuntu
Приоритет: low
CVSS2: 7.2

Описание

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

РелизСтатусПримечание
artful

not-affected

3.24.2-0ubuntu6
bionic

not-affected

3.24.2-0ubuntu6
cosmic

not-affected

3.24.2-0ubuntu6
devel

not-affected

3.24.2-0ubuntu6
disco

not-affected

3.24.2-0ubuntu6
esm-apps/xenial

not-affected

3.18.5-0ubuntu0.3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
esm-infra/bionic

not-affected

3.24.2-0ubuntu6
lucid

ignored

end of life
precise

ignored

end of life

Показывать по

Ссылки на источники

7.2 High

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

nvd
почти 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

debian
почти 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used ...

suse-cvrf
почти 11 лет назад

Security update for gnome-settings-daemon

github
больше 3 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

7.2 High

CVSS2