Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-4132

Published: 16 September 2013

KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.

Notes

AuthorNote
seth-arnold
NULL return from crypt() if the salt isn't sane
mdeslaur
This is only an issue on glibc 2.17+, so precise and quantal
aren't affected. Also, our kde-workspace packages are compiled
with pam support, so they shouldn't be vulnerable.

Priority

Low

Status

Package Release Status
kde-workspace
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable
(older glibc)
quantal Not vulnerable
(older glibc)
raring Not vulnerable
(4:4.10.5-0ubuntu0.1)
upstream
Released (4.10.5)
Patches:
upstream: https://projects.kde.org/projects/kde/kde-workspace/repository/revisions/45b7f137fbc0b942fd2c9b4e8d8c1f0293e64ba7