First published: Tue Feb 12 2019(Updated: )
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gnome Gnome Keyring | <3.27.2 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
ubuntu/gnome-keyring | <3.28.0-1 | 3.28.0-1 |
ubuntu/gnome-keyring | <3.18.3-0ubuntu2.1 | 3.18.3-0ubuntu2.1 |
ubuntu/gnome-keyring | <3.10.1-1ubuntu4.4 | 3.10.1-1ubuntu4.4 |
debian/gnome-keyring | 3.28.2-5 3.36.0-1 42.1-1 42.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.