Vulnerability Description
libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libosinfo | Libosinfo | 1.5.0 |
| Fedoraproject | Fedora | 29 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.1 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/07/08/3Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3387Third Party Advisory
- https://gitlab.com/libosinfo/libosinfo/-/tagsRelease NotesThird Party Advisory
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWSRelease NotesThird Party Advisory
- https://libosinfo.org/download/Release NotesVendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.redhat.com/archives/libosinfo/2019-July/msg00026.htmlMailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2019/07/08/3Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3387Third Party Advisory
- https://gitlab.com/libosinfo/libosinfo/-/tagsRelease NotesThird Party Advisory
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWSRelease NotesThird Party Advisory
- https://libosinfo.org/download/Release NotesVendor Advisory
FAQ
What is CVE-2019-13313?
CVE-2019-13313 is a vulnerability with a CVSS score of 7.8 (HIGH). libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
How severe is CVE-2019-13313?
CVE-2019-13313 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13313?
Check the references section above for vendor advisories and patch information. Affected products include: Libosinfo Libosinfo, Fedoraproject Fedora, Redhat Enterprise Linux, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server Aus.