CVE-2018-20781
HIGHGnome Keyring < 3.27.2 - Insufficiently Protected Credentials
Title source: ruleDescription
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3894-1/
Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpujan2021.html
Release Notes, Vendor Advisory x_refsource_misc
https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
Vendor Advisory x_refsource_misc
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://bugzilla.gnome.org/show_bug.cgi?id=781486
Third Party Advisory x_refsource_misc
https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
Third Party Advisory x_refsource_misc
https://github.com/huntergregal/mimipenguin
Scores
CVSS v3
7.8
EPSS
0.0756
EPSS Percentile
91.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-522
Status
published
Products (4)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
gnome/gnome_keyring
< 3.27.2
oracle/zfs_storage_appliance_kit
8.8
Published
Feb 12, 2019
Tracked Since
Feb 18, 2026