Package: keepass2 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerability was published for keepass2. CVE-2022-0725[0]: | A flaw was found in KeePass. The vulnerability occurs due to logging | the plain text passwords in the system log and leads to an Information | Exposure vulnerability. This flaw allows an attacker to interact and | read sensitive passwords and logs. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-0725 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0725 Please adjust the affected versions in the BTS as needed. Steps to reproduce the problem (according to https://bugzilla.redhat.com/show_bug.cgi?id=2052696) Step 1: Run "journalctl -f" in a terminal window. Step 2: Double click a password in KeePass. Step 3: Wait for the clear timeout to trigger. Actual results: See your plain text password logged in the terminal window Expected results: Never see your plain text password logged anywhere Only users in the systemd-journal group can use journalctl. At the moment I can't reproduce the problem on a custom XFCE system but I have not tried GNOME or other desktop environments yet and I suspect this problem is not limited to RedHat or Fedora. Regards, Markus
signature.asc
Description: This is a digitally signed message part