Ked Password Manager: Information leak An insecure file usage has been reported in Ked Password Manager possibly allowing confidential information to be disclosed. kedpm 2017-08-21 2017-08-26 616690 local, remote 0.4.0-r2

Helps to manage large numbers of passwords and related information and simplifies the tasks of searching and entering password data.

A history file in ~/.kedpm/history is written in clear text. All of the commands performed in the password manager are written there. This can lead to the disclosure of the master password if the “password” command is used with an argument. The names of the password entries created and consulted are also accessible in clear text.

An attacker could obtain confidential information.

There is no known workaround at this time.

Gentoo Security recommends that users unmerge Ked Password Manager:

# emerge --unmerge "app-admin/kedpm"
CVE-2017-8296 b-man b-man