CVE-2018-20781

Name
CVE-2018-20781
Description
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
Vendor Advisory https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
Issue Tracking https://bugzilla.gnome.org/show_bug.cgi?id=781486
Issue Tracking https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
Third Party Advisory https://usn.ubuntu.com/3894-1/
Third Party Advisory https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
Third Party Advisory https://github.com/huntergregal/mimipenguin
Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:gnome:gnome_keyring:*:*:*:*:*:*:*:* gnome_keyring >= None < 3.27.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status