First published: Mon Oct 28 2019(Updated: )
Python keyring lib before 0.10 created keyring files with world-readable permissions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keyring | <0.10 | 0.10 |
debian/python-keyring | 22.0.1-1 23.9.3-2 25.4.1-1 | |
python3-keyring | <0.10 | |
Debian Linux | =7.0 |
https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5577 is classified as a medium severity vulnerability due to its potential to expose sensitive keyring information.
To fix CVE-2012-5577, upgrade the keyring library to version 0.10 or later.
CVE-2012-5577 affects all versions of the keyring library prior to 0.10.
Using an affected version of keyring can lead to unauthorized access to stored credentials due to insecure file permissions.
CVE-2012-5577 impacts the keyring library regardless of the operating system but is particularly noted in versions used in Debian systems.