Описание
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-20781
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
- https://bugzilla.gnome.org/show_bug.cgi?id=781486
- https://github.com/huntergregal/mimipenguin
- https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
- https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
- https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
- https://usn.ubuntu.com/3894-1
- https://www.oracle.com/security-alerts/cpujan2021.html
Связанные уязвимости
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's pas ...
Уязвимость сервиса хранения имен пользователей и паролей GNOME Keyring, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации