Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   KDE Vendors:
KDE KRunner Race Condition Lets Physically Local Users Bypass the Screen Lock
SecurityTracker Alert ID:  1023641
SecurityTracker URL:
CVE Reference:   CVE-2010-0923   (Links to External Site)
Updated:  Mar 7 2010
Original Entry Date:  Feb 22 2010
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.4.0 only
Description:   A vulnerability was reported in KDE. A physically local user can bypass the screen lock mechanism on the target system.

A physically local user can exploit a race condition in the KRunner lock module to cause a process to crash and grant the user access to the desktop.

The vulnerability affects the locking mechanism in KRunner and not KScreenSaver. The system may be affected even if no screen saver is used.

Impact:   A physically local user can bypass the screen lock mechanism on the target system.
Solution:   The vendor has issued a fix.

Patches for KDE 4.4.0 are available via SVN at:

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, State error
Underlying OS:   Linux (Any)

Message History:   None.

 Source Message Contents

Date:  Mon, 22 Feb 2010 20:06:15 +0000
Subject:  KDE KRunner


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC