Ked Password Manager: Information leak — GLSA 201708-04

An insecure file usage has been reported in Ked Password Manager possibly allowing confidential information to be disclosed.

Affected packages

app-admin/kedpm on all architectures
Affected versions <= 0.4.0-r2
Unaffected versions

Background

Helps to manage large numbers of passwords and related information and simplifies the tasks of searching and entering password data.

Description

A history file in ~/.kedpm/history is written in clear text. All of the commands performed in the password manager are written there. This can lead to the disclosure of the master password if the “password” command is used with an argument. The names of the password entries created and consulted are also accessible in clear text.

Impact

An attacker could obtain confidential information.

Workaround

There is no known workaround at this time.

Resolution

Gentoo Security recommends that users unmerge Ked Password Manager:

 # emerge --unmerge "app-admin/kedpm"
 

References

Release date
August 21, 2017

Latest revision
August 26, 2017: 3

Severity
normal

Exploitable
local, remote

Bugzilla entries