MGASA-2021-0325

Source
https://advisories.mageia.org/MGASA-2021-0325.html
Import Source
https://advisories.mageia.org/MGASA-2021-0325.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0325
Related
Published
2021-07-10T12:56:54Z
Modified
2021-07-10T11:32:35Z
Summary
Updated libosinfo packages fix security vulnerability
Details

Updated libosinfo packages fix security vulnerability:

A flaw was found in libosinfo, version 1.5.0, where the script for automated guest installations, 'osinfo-install-script', accepts user and admin passwords via command line arguments. This could allow guest passwords to leak to other system users via a process listing (CVE-2019-13313).

The libosinfo package has been updated to version 1.8.0, fixing this issue and other bugs.

References
Credits

Affected packages

Mageia:7 / libosinfo

Package

Name
libosinfo
Purl
pkg:rpm/mageia/libosinfo?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-1.mga7

Ecosystem specific

{
    "section": "core"
}