MGASA-2023-0221

Source
https://advisories.mageia.org/MGASA-2023-0221.html
Import Source
https://advisories.mageia.org/MGASA-2023-0221.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0221
Related
Published
2023-07-07T05:54:45Z
Modified
2023-07-07T04:40:47Z
Summary
Updated keepass packages fix security vulnerability
Details

Allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. Disputed by vendor due to level of access required. (CVE-2023-24055) Possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running (CVE-2023-32784)

References
Credits

Affected packages

Mageia:8 / keepass

Package

Name
keepass
Purl
pkg:rpm/mageia/keepass?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.54-1.mga8

Ecosystem specific

{
    "section": "core"
}