CVE-2018-20781

NameCVE-2018-20781
DescriptionIn pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnome-keyring (PTS)jessie3.14.0-1vulnerable
stretch3.20.0-3vulnerable
bullseye, sid, buster3.28.2-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-keyringsource(unstable)3.28.0-1unimportant

Notes

https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
https://bugzilla.gnome.org/show_bug.cgi?id=781486
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
Not a vulnerability, just a hardening patch

Search for package or bug name: Reporting problems