CVE-2018-20781

HIGH

Gnome Keyring < 3.27.2 - Insufficiently Protected Credentials

Title source: rule
STIX 2.1

Description

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.

References (8)

Core 8
Core References
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3894-1/
Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpujan2021.html
Release Notes, Vendor Advisory x_refsource_misc
https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://bugzilla.gnome.org/show_bug.cgi?id=781486

Scores

CVSS v3 7.8
EPSS 0.0756
EPSS Percentile 91.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-522
Status published
Products (4)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
gnome/gnome_keyring < 3.27.2
oracle/zfs_storage_appliance_kit 8.8
Published Feb 12, 2019
Tracked Since Feb 18, 2026