Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2012-6111

Disclosure Date: December 20, 2019 (last updated November 27, 2024)
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function
Attacker Value
Unknown

CVE-2018-20781

Disclosure Date: February 12, 2019 (last updated November 27, 2024)
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Attacker Value
Unknown

CVE-2018-19358

Disclosure Date: November 18, 2018 (last updated November 08, 2023)
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.
0
Attacker Value
Unknown

CVE-2012-3466

Disclosure Date: October 22, 2012 (last updated October 05, 2023)
GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
0