CVE-2018-20781

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gnome_keyring:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-02-12 17:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-20781

Mitre link : CVE-2018-20781

CVE.ORG link : CVE-2018-20781


JSON object : View

Products Affected

oracle

  • zfs_storage_appliance_kit

canonical

  • ubuntu_linux

gnome

  • gnome_keyring
CWE
CWE-522

Insufficiently Protected Credentials