This bug was fixed in the package gnome-keyring - 3.18.3-0ubuntu2.1
---
gnome-keyring (3.18.3-0ubuntu2.1) xenial-security; urgency=medium
* SECURITY UPDATE: credentials exposed in memory (LP: #1772919)
- debian/patches/CVE-2018-20781.patch: destroy the password in
This bug was fixed in the package gnome-keyring - 3.10.1-1ubuntu4.4
---
gnome-keyring (3.10.1-1ubuntu4.4) trusty-security; urgency=medium
* SECURITY UPDATE: credentials exposed in memory (LP: #1772919)
- debian/patches/CVE-2018-20781.patch: destroy the password in
** Also affects: gnome-keyring (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: gnome-keyring (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: gnome-keyring (Ubuntu)
Status: New => Fix Released
** Changed in: gnome-keyring (Ubuntu
Please check the attached patch applied on gnome-keyring 3.28.
(see https://bug781486.bugzilla-attachments.gnome.org/attachment.cgi?id=350049)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-keyring in Ubuntu.
Setting to new because they submitted it upstream.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1772919
Title:
pam-gnome-keyring.so reveals user’s password credential as a
Setting to new because he submitted it upstream.
** Changed in: gnome-keyring (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1772919
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1772919
Title:
pam-gnome-keyring.so reveals user’s password
7 matches
Mail list logo