[USN-3894-1] GNOME Keyring vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”TF1mryNZdggDe3s9lI9WqmoHl5xhF20FR”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–TF1mryNZdggDe3s9lI9WqmoHl5xhF20FR

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3894-1] GNOME Keyring vulnerability

–7vCWfbbp09qLIRekl1mR6oU2gAy85RD0g

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3894-1
February 26, 2019

gnome-keyring vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

GNOME Keyring could be made to expose sensitive information.

Software Description:
– gnome-keyring: GNOME keyring services

Details:

It was discovered that GNOME Keyring incorrectly cleared out credentials
supplied to the PAM module. A local attacker could possibly use this issu=
e
to discover login credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
gnome-keyring 3.18.3-0ubuntu2.1
libpam-gnome-keyring 3.18.3-0ubuntu2.1

Ubuntu 14.04 LTS:
gnome-keyring 3.10.1-1ubuntu4.4
libpam-gnome-keyring 3.10.1-1ubuntu4.4

After a standard system update you need to restart your session to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3894-1
CVE-2018-20781

Package Information:
https://launchpad.net/ubuntu/+source/gnome-keyring/3.18.3-0ubuntu2.1
https://launchpad.net/ubuntu/+source/gnome-keyring/3.10.1-1ubuntu4.4

–7vCWfbbp09qLIRekl1mR6oU2gAy85RD0g–

–TF1mryNZdggDe3s9lI9WqmoHl5xhF20FR

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=Vx3r
—–END PGP SIGNATURE—–

–TF1mryNZdggDe3s9lI9WqmoHl5xhF20FR–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK