<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gnome-settings-daemon</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0515-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-02-12T07:58:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-02-12T07:58:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-02-12T07:58:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gnome-settings-daemon</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
gnome-settings-daemon was updated to fix a bug and a security issue:

Security issue fixed:
- CVE-2014-7300: The lockscreen can be bypassed with the Print Screen button.

Bug fixed:
- Do not hide the cursor while there was no mutter running (bsc#905158).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-2015-126,SUSE-SLE-SDK-12-2015-126,SUSE-SLE-SERVER-12-2015-126</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150515-1/</URL>
      <Description>Link for SUSE-SU-2015:0515-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-March/001293.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0515-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/900031</URL>
      <Description>SUSE Bug 900031</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/905158</URL>
      <Description>SUSE Bug 905158</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7300/</URL>
      <Description>SUSE CVE CVE-2014-7300 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12" CPE="cpe:/o:suse:sled:12">SUSE Linux Enterprise Desktop 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12" CPE="cpe:/o:suse:sle-sdk:12">SUSE Linux Enterprise Software Development Kit 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnome-settings-daemon-3.10.2-20.1">
      <FullProductName ProductID="gnome-settings-daemon-3.10.2-20.1">gnome-settings-daemon-3.10.2-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnome-settings-daemon-lang-3.10.2-20.1">
      <FullProductName ProductID="gnome-settings-daemon-lang-3.10.2-20.1">gnome-settings-daemon-lang-3.10.2-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnome-settings-daemon-devel-3.10.2-20.1">
      <FullProductName ProductID="gnome-settings-daemon-devel-3.10.2-20.1">gnome-settings-daemon-devel-3.10.2-20.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gnome-settings-daemon-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:gnome-settings-daemon-3.10.2-20.1">gnome-settings-daemon-3.10.2-20.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-lang-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:gnome-settings-daemon-lang-3.10.2-20.1">gnome-settings-daemon-lang-3.10.2-20.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:gnome-settings-daemon-3.10.2-20.1">gnome-settings-daemon-3.10.2-20.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-lang-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:gnome-settings-daemon-lang-3.10.2-20.1">gnome-settings-daemon-lang-3.10.2-20.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:gnome-settings-daemon-3.10.2-20.1">gnome-settings-daemon-3.10.2-20.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-lang-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:gnome-settings-daemon-lang-3.10.2-20.1">gnome-settings-daemon-lang-3.10.2-20.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnome-settings-daemon-devel-3.10.2-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:gnome-settings-daemon-devel-3.10.2-20.1">gnome-settings-daemon-devel-3.10.2-20.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.</Note>
    </Notes>
    <CVE>CVE-2014-7300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:gnome-settings-daemon-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:gnome-settings-daemon-lang-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:gnome-settings-daemon-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:gnome-settings-daemon-lang-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:gnome-settings-daemon-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:gnome-settings-daemon-lang-3.10.2-20.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:gnome-settings-daemon-devel-3.10.2-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150515-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7300.html</URL>
        <Description>CVE-2014-7300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/900031</URL>
        <Description>SUSE Bug 900031</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
