Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Jan 2013 20:19:34 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Florian Weimer <fweimer@...hat.com>
Subject: Re: gnome-keyring does not discard stored secrets
 in some cases

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/11/2013 02:36 AM, Florian Weimer wrote:
> On 01/11/2013 08:38 AM, Kurt Seifried wrote:
>> On 01/10/2013 11:45 PM, Florian Weimer wrote:
>>> I had trouble finding a caller of this function, but the
>>> submitter indicated that gnome-power-manager uses it in older
>>> versions:
>>> 
>>> <http://git.gnome.org/browse/gnome-power-manager/tree/src/gpm-control.c?h=gnome-2-32#n162>
>>>
>>>
>>>
>>> 
I'm not sure if this needs a CVE, but it's probably worth fixing
>>> anyway.
>> 
>> What security violation occurs/what trust boundary is crossed?
> 
> I think the expectation was that key material is discarded on 
> suspend/hibernate.  This seems quite desirable for hibernate
> without encrypted swap.
> 
> I've verified that Fedora 17 (GNOME 3.4) does not discard cached
> keys on suspend and hibernate, either.  (Swap is encrypted, though,
> at least I selected that in the installer.)  However, I suspect
> that users expect that suspend (but perhaps not hibernate) does not
> discard keys.

Just to confirm, is this behavior documented at all in the gnome
keyring documentation (e.g. that it does or doesn't do it)? Thanks.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=+2ir
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.