First published: Mon Nov 25 2019(Updated: )
Python keyring has insecure permissions on new databases allowing world-readable files to be created
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keyring | <0.10 | 0.10 |
debian/python-keyring | 22.0.1-1 23.9.3-2 25.4.1-1 | |
python3-keyring | <=0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-5578 is classified as medium due to the potential for unauthorized file access.
To fix CVE-2012-5578, upgrade Python keyring to version 22.0.1-1, 23.9.3-2, or 25.4.1-1.
Versions of Python keyring up to and including 0.10 are affected by CVE-2012-5578.
CVE-2012-5578 is a permissions vulnerability that allows the creation of world-readable files.
CVE-2012-5578 specifically affects the Python keyring package and is not related to other software.