CVE-2014-7300 (retired)

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used,
does not limit the aggregate memory consumption of all active PrtSc
requests, which allows physically proximate attackers to execute arbitrary
commands on an unattended workstation by making many PrtSc requests and
leveraging a temporary lock outage, and the resulting temporary shell
availability, caused by the Linux kernel OOM killer.
Upstream:released (3.14.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.18.5-0ubuntu0.3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.24.2-0ubuntu6)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.24.2-0ubuntu6)
Ubuntu 19.04 (Disco Dingo):not-affected (3.24.2-0ubuntu6)
Ubuntu 19.10 (Eoan):not-affected (3.24.2-0ubuntu6)
More Information

Updated: 2019-04-26 14:33:51 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)