Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2012-6111

Disclosure Date: December 20, 2019 (last updated November 27, 2024)
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function
Attacker Value
Unknown

CVE-2012-5578

Disclosure Date: November 25, 2019 (last updated November 27, 2024)
Python keyring has insecure permissions on new databases allowing world-readable files to be created
Attacker Value
Unknown

CVE-2012-5577

Disclosure Date: October 28, 2019 (last updated November 27, 2024)
Python keyring lib before 0.10 created keyring files with world-readable permissions.
Attacker Value
Unknown

CVE-2018-20781

Disclosure Date: February 12, 2019 (last updated November 27, 2024)
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Attacker Value
Unknown

CVE-2018-19358

Disclosure Date: November 18, 2018 (last updated November 08, 2023)
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.
0
Attacker Value
Unknown

CVE-2012-4571

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack.
0
Attacker Value
Unknown

CVE-2012-3466

Disclosure Date: October 22, 2012 (last updated October 05, 2023)
GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
0