Gnome Keyring Gnome Keyring

Do you want an email whenever new security vulnerabilities are reported in Gnome Keyring?

By the Year

In 2024 there have been 0 vulnerabilities in Gnome Keyring . Gnome Keyring did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 1 7.80
2018 1 7.80

It may take a day or so for new Gnome Keyring vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Gnome Keyring Security Vulnerabilities

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned

CVE-2018-20781 7.8 - High - February 12, 2019

In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.

Insufficiently Protected Credentials

GNOME Keyring through 3.28.2

CVE-2018-19358 7.8 - High - November 18, 2018

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Gnome Keyring or by GNOME? Click the Watch button to subscribe.

GNOME
Vendor

Gnome Keyring
Product

subscribe