CVE-2018-20781

NameCVE-2018-20781
DescriptionIn pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnome-keyring (PTS)jessie3.14.0-1vulnerable
stretch3.20.0-3vulnerable
buster3.28.2-5fixed
bullseye3.36.0-1fixed
bookworm42.1-1fixed
sid, trixie46.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-keyringsourcewheezy(unfixed)end-of-life
gnome-keyringsource(unstable)3.28.0-1unimportant

Notes

https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
https://bugzilla.gnome.org/show_bug.cgi?id=781486
https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
Not a vulnerability, just a hardening patch

Search for package or bug name: Reporting problems