First published: Mon Jul 08 2019(Updated: )
libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line. Reference: <a href="https://gitlab.com/libosinfo/libosinfo/-/tags">https://gitlab.com/libosinfo/libosinfo/-/tags</a> <a href="https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS">https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS</a> <a href="https://libosinfo.org/download/">https://libosinfo.org/download/</a> <a href="https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html">https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libosinfo-l10n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1727766 is considered to be moderate due to the exposure of sensitive credentials.
To fix REDHAT-BUG-1727766, you should upgrade to the latest version of libosinfo that addresses this vulnerability.
libosinfo versions prior to 1.5.0 are affected by REDHAT-BUG-1727766.
No, REDHAT-BUG-1727766 requires local access to exploit the vulnerability.
The vulnerability in REDHAT-BUG-1727766 exposes user credentials that are passed via the command line to the osinfo-install-script.