Lucene search

K
mageiaGentoo FoundationMGASA-2021-0325
HistoryJul 10, 2021 - 3:56 p.m.

Updated libosinfo packages fix security vulnerability

2021-07-1015:56:54
Gentoo Foundation
advisories.mageia.org
41
libosinfo
security vulnerability
automated guest installations
passwords
cve-2019-13313
version 1.8.0
bugs
unix

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Updated libosinfo packages fix security vulnerability: A flaw was found in libosinfo, version 1.5.0, where the script for automated guest installations, ‘osinfo-install-script’, accepts user and admin passwords via command line arguments. This could allow guest passwords to leak to other system users via a process listing (CVE-2019-13313). The libosinfo package has been updated to version 1.8.0, fixing this issue and other bugs.

OSVersionArchitecturePackageVersionFilename
Mageia7noarchlibosinfo< 1.8.0-1libosinfo-1.8.0-1.mga7

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%