virt-bootstrap 1.1.0 allows local users to discover a root password by listing a process, because this password may be present in the --root-password option to virt_bootstrap.py.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.redhat.com/archives/virt-tools-list/2019-July/msg00043.html | mailing list third party advisory exploit |
https://github.com/virt-manager/virt-bootstrap/releases | third party advisory release notes |
http://www.openwall.com/lists/oss-security/2019/07/08/3 | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2PQSLGSTPVQ5WQ4DDKFV4I262JIFXY6/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKMQLYAHCDIE5TBXWDNBG7554KWI5QT3/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00080.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00026.html | vendor advisory |