This bug was fixed in the package cyrus-sasl2 - 2.1.25.dfsg1-6ubuntu0.1
---------------
cyrus-sasl2 (2.1.25.dfsg1-6ubuntu0.1) raring-security; urgency=low
* SECURITY UPDATE: denial of service via invalid salt (LP: #1187001)
- debian/patches/CVE-2013-4122.patch: properly handle glibc returning
NULL on an invalid salt in pwcheck/pwcheck_getpwnam.c,
pwcheck/pwcheck_getspnam.c, saslauthd/auth_getpwent.c,
saslauthd/auth_shadow.c.
- CVE-2013-4122
-- Marc Deslauriers <[email protected]> Mon, 07 Oct 2013 08:40:56
-0400
** Changed in: cyrus-sasl2 (Ubuntu Raring)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1187001
Title:
saslauthd[26791]: segfault at 0 ip b71de6f1 sp bfcd2d9c error 4 in
libc-2.17.so[b7160000+1ad000]
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cyrus-sasl2/+bug/1187001/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs