Bug 1125261 - (CVE-2018-20781) VUL-1: CVE-2018-20781: gnome-keyring: user's cleartext password is kept in a session-child process
(CVE-2018-20781)
VUL-1: CVE-2018-20781: gnome-keyring: user's cleartext password is kept in a ...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: E-mail List
Security Team bot
https://smash.suse.de/issue/224624/
CVSSv3:SUSE:CVE-2018-20781:4.4:(AV:L...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-02-13 09:05 UTC by Robert Frohl
Modified: 2020-06-29 06:37 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2019-02-13 09:05:54 UTC
CVE-2018-20781

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is
kept in a session-child process spawned from the LightDM daemon. This can expose
the credential in cleartext.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20781
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
https://bugzilla.gnome.org/show_bug.cgi?id=781486
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
Comment 1 Robert Frohl 2019-02-13 10:42:14 UTC
Codestreams affected:
- SUSE:SLE-11-SP1:Update
- SUSE:SLE-11-SP2:Update
- SUSE:SLE-12:Update
- SUSE:SLE-12-SP2:Update
- SUSE:SLE-15:Update 

a fix is attached to the upstream ticket:
https://bug781486.bugzilla-attachments.gnome.org/attachment.cgi?id=350049