{"id":"CVE-2018-10380","details":"kwallet-pam in KDE KWallet before 5.12.6 allows local users to obtain ownership of arbitrary files via a symlink attack.","modified":"2026-05-18T05:50:17.630160571Z","published":"2018-05-08T12:29:00.210Z","related":["openSUSE-SU-2024:11141-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux"},{"cpes":["cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"15.0"},{"last_affected":"42.3"}],"vendor_product":"opensuse:leap"}]},"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4200"},{"type":"FIX","url":"https://bugzilla.suse.com/show_bug.cgi?id=1090863"},{"type":"FIX","url":"https://commits.kde.org/kwallet-pam/01d4143fda5bddb6dca37b23304dc239a5fb38b5"},{"type":"FIX","url":"https://commits.kde.org/kwallet-pam/2134dec85ce19d6378d03cddfae9e5e464cb24c0"},{"type":"FIX","url":"https://commits.kde.org/kwallet-pam/802f305d81f8771c4f4a8bd7fd0e368ffc6f9b3b"},{"type":"FIX","url":"https://commits.kde.org/kwallet-pam/99abc7fde21f40cc6da5feb6ee766cc46fcca1f8"},{"type":"FIX","url":"https://www.kde.org/info/security/advisory-20180503-1.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kde/plasma-workspace","events":[{"introduced":"0"},{"fixed":"8b9e471fe578fe68a2118b1f5ce90ffe72dc11dc"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"5.12.6"}],"cpe":"cpe:2.3:a:kde:plasma:*:*:*:*:*:*:*:*"}}],"versions":["v5.12.5","v5.12.4","v5.12.3","v5.12.2","v5.12.1","v5.12.0","v5.11.95","v5.9.95","v5.8.95","v5.7.95","v5.5.95","v5.5.4","v5.5.3","v5.5.2","v5.5.1","v5.5.0","v5.4.95","v5.3.95","v5.2.95","v5.1.95","v5.0.95","v5.0.0","v4.98.0","v4.97.0","v4.96.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-10380.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}