Hi,

QtPass uses `pwgen` to generate passwords by default. This means, if you
didn't change the configuration to use the built-in password generator
your passwords are safe. If you used the built-in password generator,
change all passwords you generated with QtPass.

So, the number of affected people using the Ubuntu/Debian version should
be rather low. Nonetheless there are fixed version available in bionic
and I prepared a fix for qtpass 1.1.6 (the version in artful) which
Ubuntu could copy from Debian stable-proposed-updates.

You should point the Ubuntu security team to the fixed version for
artful (1.1.6-1+deb9u1) and ask them to copy it from Debian s-p-u.

Hope that helps

Philip

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18021

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747954

Title:
  qtpass generates possibly predictable and enumerable passwords

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtpass/+bug/1747954/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to