Bug 1140749 (CVE-2019-13313)

Summary: VUL-1: CVE-2019-13313: libosinfo: osinfo-install-script option leaks password via command line argument
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Charles Arnold <carnold>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P4 - Low CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/236540/
Whiteboard: CVSSv3:SUSE:CVE-2019-13313:2.8:(AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Comment 1 Charles Arnold 2019-07-08 20:23:56 UTC
Currently, only openSUSE Factory / Tumbleweed use version 1.5.0.
Comment 2 Marcus Meissner 2019-07-09 05:43:05 UTC
also the older version pass through passwords on the commandline.

that said with the small time window where this can happen there is no urgency in fixing this.
Comment 4 Swamp Workflow Management 2019-09-03 16:16:05 UTC
SUSE-SU-2019:2273-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (moderate)
Bug References: 1054986,1105607,1122858,1140749
CVE References: CVE-2019-13313
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    libosinfo-0.2.12-13.3.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    libosinfo-0.2.12-13.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.