GNOME Keyring: non expiration of gpg cache
Synthesis of the vulnerability
Authentication data stored in the GNOME Keyring gpg cache do not expire after the idle time defined by the administrator.Impacted products:
Fedora, MBS, openSUSE, Unix (platform).
681081, 845426, BID-54920, CVE-2012-3466, FEDORA-2012-12368, MDVSA-2013:084, openSUSE-SU-2012:1121-1, VIGILANCE-VUL-11835.
Description of the vulnerability
The GNOME Keyring tool stores user's passwords (session, ssh, gpg, etc.), so they are not requested again.
The org.gnome.crypto.cache gpg-cache-ttl option (in mode "idle") defines the expiration delay for stored data. However, the daemon/gpg-agent/gkd-gpg-agent-ops.c file, which implements the gpg cache, does not use this option.
Authentication data stored in the GNOME Keyring gpg cache therefore do not expire after the idle time defined by the administrator.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides network vulnerability analysis
. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.