CVE-2018-20781

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gnome_keyring:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

16 Mar 2021, 14:02

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - Third Party Advisory
References (MISC) https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919 - Issue Tracking, Patch (MISC) https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919 - Issue Tracking, Patch, Third Party Advisory
References (MISC) https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da - (MISC) https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da - Third Party Advisory
References (MISC) https://github.com/huntergregal/mimipenguin - (MISC) https://github.com/huntergregal/mimipenguin - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

20 Jan 2021, 15:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2021.html -

Information

Published : 2019-02-12 17:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-20781

Mitre link : CVE-2018-20781

CVE.ORG link : CVE-2018-20781


JSON object : View

Products Affected

oracle

  • zfs_storage_appliance_kit

canonical

  • ubuntu_linux

gnome

  • gnome_keyring
CWE
CWE-522

Insufficiently Protected Credentials