Описание
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 3.28.0.2-1ubuntu1.18.04.1 |
| cosmic | not-affected | |
| devel | not-affected | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [3.10.1-1ubuntu4.4]] |
| esm-infra/bionic | not-affected | 3.28.0.2-1ubuntu1.18.04.1 |
| esm-infra/xenial | released | 3.18.3-0ubuntu2.1 |
| precise/esm | DNE | |
| trusty | released | 3.10.1-1ubuntu4.4 |
| trusty/esm | DNE | trusty was released [3.10.1-1ubuntu4.4] |
| upstream | released | 3.28.0-1 |
Показывать по
EPSS
2.1 Low
CVSS2
7.8 High
CVSS3
Связанные уязвимости
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's pas ...
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Уязвимость сервиса хранения имен пользователей и паролей GNOME Keyring, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
2.1 Low
CVSS2
7.8 High
CVSS3