Mageia 2021-0325: libosinfo security update
Summary
Updated libosinfo packages fix security vulnerability:
A flaw was found in libosinfo, version 1.5.0, where the script for
automated guest installations, 'osinfo-install-script', accepts user
and admin passwords via command line arguments. This could allow guest
passwords to leak to other system users via a process listing
(CVE-2019-13313).
The libosinfo package has been updated to version 1.8.0, fixing this
issue and other bugs.
References
- https://bugs.mageia.org/show_bug.cgi?id=25112
- https://access.redhat.com/errata/RHSA-2019:3387
- https://access.redhat.com/errata/RHBA-2020:4758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13313
Resolution
MGASA-2021-0325 - Updated libosinfo packages fix security vulnerability
SRPMS
- 7/core/libosinfo-1.8.0-1.mga7