Package: keepass2
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for keepass2.

CVE-2022-0725[0]:
| A flaw was found in KeePass. The vulnerability occurs due to logging
| the plain text passwords in the system log and leads to an Information
| Exposure vulnerability. This flaw allows an attacker to interact and
| read sensitive passwords and logs.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-0725
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0725

Please adjust the affected versions in the BTS as needed.

Steps to reproduce the problem (according
to https://bugzilla.redhat.com/show_bug.cgi?id=2052696)


Step 1: Run "journalctl -f" in a terminal window.
Step 2: Double click a password in KeePass.
Step 3: Wait for the clear timeout to trigger.

Actual results:
See your plain text password logged in the terminal window

Expected results:
Never see your plain text password logged anywhere


Only users in the systemd-journal group can use journalctl. At the moment I
can't reproduce the problem on a custom XFCE system but I have not tried GNOME
or other desktop environments yet and I suspect this problem is not limited to
RedHat or Fedora.


Regards,

Markus

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to