Total vulnerabilities in the database
GDM 2.4.4.x before 2.4.4.4, and 2.4.1.x before 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows attackers to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
Software | From | Fixed in |
---|---|---|
gnome / gdm | 2.4.1 | 2.4.1.x |
gnome / gdm | 2.4.4 | 2.4.4.x |
gnome / gdm | 2.4.1.5 | 2.4.1.5.x |
gnome / gdm | 2.4.1.2 | 2.4.1.2.x |
gnome / gdm | 2.4.1.4 | 2.4.1.4.x |
gnome / gdm | 2.2.5.4 | 2.2.5.4.x |
gnome / gdm | 2.4.1.3 | 2.4.1.3.x |
gnome / gdm | 2.4.1.6 | 2.4.1.6.x |
gnome / gdm | 2.4.1.1 | 2.4.1.1.x |