Bug 1125261 (CVE-2018-20781)

Summary: VUL-1: CVE-2018-20781: gnome-keyring: user's cleartext password is kept in a session-child process
Product: [Novell Products] SUSE Security Incidents Reporter: Robert Frohl <rfrohl>
Component: IncidentsAssignee: E-mail List <gnome-bugs>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P4 - Low CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/224624/
Whiteboard: CVSSv3:SUSE:CVE-2018-20781:4.4:(AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) maint:planned:update
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Robert Frohl 2019-02-13 09:05:54 UTC
CVE-2018-20781

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is
kept in a session-child process spawned from the LightDM daemon. This can expose
the credential in cleartext.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20781
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
https://bugzilla.gnome.org/show_bug.cgi?id=781486
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
Comment 1 Robert Frohl 2019-02-13 10:42:14 UTC
Codestreams affected:
- SUSE:SLE-11-SP1:Update
- SUSE:SLE-11-SP2:Update
- SUSE:SLE-12:Update
- SUSE:SLE-12-SP2:Update
- SUSE:SLE-15:Update 

a fix is attached to the upstream ticket:
https://bug781486.bugzilla-attachments.gnome.org/attachment.cgi?id=350049