Descriptionsystemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs929116

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
systemd (PTS)jessie215-17+deb8u7vulnerable
jessie (security)215-17+deb8u13vulnerable
stretch (security)232-25+deb9u11vulnerable
bullseye, sid244-3vulnerable
xorg-server (PTS)jessie (security), jessie2:1.16.4-1+deb8u2vulnerable
stretch (security)2:1.19.2-1+deb9u4vulnerable
bullseye, sid2:1.20.7-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - systemd <no-dsa> (Minor issue)
[stretch] - systemd <no-dsa> (Minor issue)
[jessie] - systemd <no-dsa> (Not reproducible without Ubuntu-style persistant VT1 greeter; too invasive to fix)
[jessie] - xorg-server <postponed> (Minor issue, revisit when the situation is clarified)
The fix introduced a regression, cf.
Issue was originally fixed for unstable in 241-4 but was reverted in 241-5
Upstream from systemd claimed originally it's not an issue in systemd, but
might revisit. Furthermore the issue might be fixed in the xorg xserver.
Tentative merge request:
Further analysis on the problem:
plymouth fix:
The plymouth fix does not seem to be enough though, cf.

Search for package or bug name: Reporting problems