In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://usn.ubuntu.com/3894-1/ | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | third party advisory |
https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2 | release notes vendor advisory |
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3 | vendor advisory |
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919 | issue tracking third party advisory patch |
https://bugzilla.gnome.org/show_bug.cgi?id=781486 | issue tracking patch vendor advisory |
https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da | third party advisory |
https://github.com/huntergregal/mimipenguin | third party advisory |