Описание
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Ссылки
- Issue TrackingPatchThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Release NotesVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Release NotesVendor Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
7.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
Связанные уязвимости
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's pas ...
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Уязвимость сервиса хранения имен пользователей и паролей GNOME Keyring, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
7.8 High
CVSS3
2.1 Low
CVSS2