MGASA-2021-0325 - Updated libosinfo packages fix security vulnerability

Publication date: 10 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0325.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-13313

Updated libosinfo packages fix security vulnerability:

A flaw was found in libosinfo, version 1.5.0, where the script for
automated guest installations, 'osinfo-install-script', accepts user
and admin passwords via command line arguments. This could allow guest
passwords to leak to other system users via a process listing
(CVE-2019-13313).

The libosinfo package has been updated to version 1.8.0, fixing this
issue and other bugs.

References:
- https://bugs.mageia.org/show_bug.cgi?id=25112
- https://access.redhat.com/errata/RHSA-2019:3387
- https://access.redhat.com/errata/RHBA-2020:4758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13313

SRPMS:
- 7/core/libosinfo-1.8.0-1.mga7