KDM local DoS with user images
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
kdebase (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Undecided
|
Unassigned | ||
Edgy |
Fix Released
|
Undecided
|
Unassigned | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: kdebase
A regular user with a valid account is able to make login via KDM
impossible. A regular user can also cause KDM to exceed the
system resource limits.
KDM can be tricked into hanging or eating memory by reading from
special files (pipes or symlinks to devices), big or sparse files
created in the users home directory.
A regular user with a valid account is able to prepare his home
directory in a way that will make login via KDM impossible for
any user if KDM's user list display is enabled and users are
permitted to add their own images. Given that the account can be
identified easily, this issue is only sensitive for high
security environments.
kdebase (4:3.5.8-2ubuntu5) hardy; urgency=low
* Add kubuntu_ 9914_kdm_ user_image_ check.diff from upstream
fixes potential KDM local DoS if users set an invalid image
Closes LP: #176347
-- Jonathan Riddell <email address hidden> Fri, 14 Dec 2007 12:24:17 +0000