Rapid7 Vulnerability & Exploit Database

ELSA-2015-0535 Low: Oracle Linux GNOME Shell security, bug fix, and enhancement update

Back to Search

ELSA-2015-0535 Low: Oracle Linux GNOME Shell security, bug fix, and enhancement update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
03/12/2015
Created
07/25/2018
Added
03/13/2015
Modified
07/04/2017

Description

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

Solution(s)

  • oracle-linux-upgrade-clutter
  • oracle-linux-upgrade-clutter-devel
  • oracle-linux-upgrade-clutter-doc
  • oracle-linux-upgrade-cogl
  • oracle-linux-upgrade-cogl-devel
  • oracle-linux-upgrade-cogl-doc
  • oracle-linux-upgrade-gnome-shell
  • oracle-linux-upgrade-gnome-shell-browser-plugin
  • oracle-linux-upgrade-mutter
  • oracle-linux-upgrade-mutter-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;