Vulnerability from csaf_opensuse
Published
2019-04-03 01:50
Modified
2019-04-03 01:50
Summary
Security update for ansible
Notes
Title of the patch
Security update for ansible
Description of the patch
This update for ansible to version 2.7.8 fixes the following issues:
Security issues fixed:
- CVE-2018-16837: Fixed an information leak in user module (bsc#1112959).
- CVE-2018-16859: Fixed an issue which clould allow logging of password in plaintext in Windows powerShell (bsc#1116587).
- CVE-2019-3828: Fixed a path traversal vulnerability in fetch module (bsc#1126503).
- CVE-2018-10875: Fixed a potential code execution in ansible.cfg (bsc#1099808).
- CVE-2018-16876: Fixed an issue which could allow information disclosure in vvv+ mode with no_log on (bsc#1118896).
Other issues addressed:
- prepare update to 2.7.8 for multiple releases (boo#1102126, boo#1109957)
Release notes: https://github.com/ansible/ansible/blob/stable-2.7/changelogs/CHANGELOG-v2.7.rst#id1
Patchnames
openSUSE-2019-1125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for ansible", title: "Title of the patch", }, { category: "description", text: "This update for ansible to version 2.7.8 fixes the following issues:\n\nSecurity issues fixed: \t \n\n- CVE-2018-16837: Fixed an information leak in user module (bsc#1112959).\n- CVE-2018-16859: Fixed an issue which clould allow logging of password in plaintext in Windows powerShell (bsc#1116587).\n- CVE-2019-3828: Fixed a path traversal vulnerability in fetch module (bsc#1126503).\n- CVE-2018-10875: Fixed a potential code execution in ansible.cfg (bsc#1099808).\n- CVE-2018-16876: Fixed an issue which could allow information disclosure in vvv+ mode with no_log on (bsc#1118896).\n\nOther issues addressed: \n\n- prepare update to 2.7.8 for multiple releases (boo#1102126, boo#1109957)\n\nRelease notes: https://github.com/ansible/ansible/blob/stable-2.7/changelogs/CHANGELOG-v2.7.rst#id1\n ", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-1125", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1125-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:1125-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW/#P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:1125-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW/#P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW", }, { category: "self", summary: "SUSE Bug 1099808", url: "https://bugzilla.suse.com/1099808", }, { category: "self", summary: "SUSE Bug 1102126", url: "https://bugzilla.suse.com/1102126", }, { category: "self", summary: "SUSE Bug 1109957", url: "https://bugzilla.suse.com/1109957", }, { category: "self", summary: "SUSE Bug 1112959", url: "https://bugzilla.suse.com/1112959", }, { category: "self", summary: "SUSE Bug 1116587", url: "https://bugzilla.suse.com/1116587", }, { category: "self", summary: "SUSE Bug 1118896", url: "https://bugzilla.suse.com/1118896", }, { category: "self", summary: "SUSE Bug 1126503", url: "https://bugzilla.suse.com/1126503", }, { category: "self", summary: "SUSE CVE CVE-2018-10875 page", url: "https://www.suse.com/security/cve/CVE-2018-10875/", }, { category: "self", summary: "SUSE CVE CVE-2018-16837 page", url: "https://www.suse.com/security/cve/CVE-2018-16837/", }, { category: "self", summary: "SUSE CVE CVE-2018-16859 page", url: "https://www.suse.com/security/cve/CVE-2018-16859/", }, { category: "self", summary: "SUSE CVE CVE-2018-16876 page", url: "https://www.suse.com/security/cve/CVE-2018-16876/", }, { category: "self", summary: "SUSE CVE CVE-2019-3828 page", url: "https://www.suse.com/security/cve/CVE-2019-3828/", }, ], title: "Security update for ansible", tracking: { current_release_date: "2019-04-03T01:50:46Z", generator: { date: "2019-04-03T01:50:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:1125-1", initial_release_date: "2019-04-03T01:50:46Z", revision_history: [ { date: "2019-04-03T01:50:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "ansible-2.7.8-bp150.3.6.1.noarch", product: { name: "ansible-2.7.8-bp150.3.6.1.noarch", product_id: "ansible-2.7.8-bp150.3.6.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Package Hub 12", product: { name: "SUSE Package Hub 12", product_id: "SUSE Package Hub 12", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:12", }, }, }, { category: "product_name", name: "SUSE Package Hub 15", product: { name: "SUSE Package Hub 15", product_id: "SUSE Package Hub 15", }, }, { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "ansible-2.7.8-bp150.3.6.1.noarch as component of SUSE Package Hub 12", product_id: "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", }, product_reference: "ansible-2.7.8-bp150.3.6.1.noarch", relates_to_product_reference: "SUSE Package Hub 12", }, { category: "default_component_of", full_product_name: { name: "ansible-2.7.8-bp150.3.6.1.noarch as component of SUSE Package Hub 15", product_id: "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", }, product_reference: "ansible-2.7.8-bp150.3.6.1.noarch", relates_to_product_reference: "SUSE Package Hub 15", }, { category: "default_component_of", full_product_name: { name: "ansible-2.7.8-bp150.3.6.1.noarch as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", }, product_reference: "ansible-2.7.8-bp150.3.6.1.noarch", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10875", }, ], notes: [ { category: "general", text: "A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-10875", url: "https://www.suse.com/security/cve/CVE-2018-10875", }, { category: "external", summary: "SUSE Bug 1099808 for CVE-2018-10875", url: "https://bugzilla.suse.com/1099808", }, { category: "external", summary: "SUSE Bug 1109957 for CVE-2018-10875", url: "https://bugzilla.suse.com/1109957", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], threats: [ { category: "impact", date: "2019-04-03T01:50:46Z", details: "important", }, ], title: "CVE-2018-10875", }, { cve: "CVE-2018-16837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16837", }, ], notes: [ { category: "general", text: "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-16837", url: "https://www.suse.com/security/cve/CVE-2018-16837", }, { category: "external", summary: "SUSE Bug 1112959 for CVE-2018-16837", url: "https://bugzilla.suse.com/1112959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], threats: [ { category: "impact", date: "2019-04-03T01:50:46Z", details: "important", }, ], title: "CVE-2018-16837", }, { cve: "CVE-2018-16859", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16859", }, ], notes: [ { category: "general", text: "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-16859", url: "https://www.suse.com/security/cve/CVE-2018-16859", }, { category: "external", summary: "SUSE Bug 1109957 for CVE-2018-16859", url: "https://bugzilla.suse.com/1109957", }, { category: "external", summary: "SUSE Bug 1116587 for CVE-2018-16859", url: "https://bugzilla.suse.com/1116587", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], threats: [ { category: "impact", date: "2019-04-03T01:50:46Z", details: "moderate", }, ], title: "CVE-2018-16859", }, { cve: "CVE-2018-16876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16876", }, ], notes: [ { category: "general", text: "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-16876", url: "https://www.suse.com/security/cve/CVE-2018-16876", }, { category: "external", summary: "SUSE Bug 1109957 for CVE-2018-16876", url: "https://bugzilla.suse.com/1109957", }, { category: "external", summary: "SUSE Bug 1118896 for CVE-2018-16876", url: "https://bugzilla.suse.com/1118896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], threats: [ { category: "impact", date: "2019-04-03T01:50:46Z", details: "low", }, ], title: "CVE-2018-16876", }, { cve: "CVE-2019-3828", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3828", }, ], notes: [ { category: "general", text: "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-3828", url: "https://www.suse.com/security/cve/CVE-2019-3828", }, { category: "external", summary: "SUSE Bug 1126503 for CVE-2019-3828", url: "https://bugzilla.suse.com/1126503", }, { category: "external", summary: "SUSE Bug 1164137 for CVE-2019-3828", url: "https://bugzilla.suse.com/1164137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch", "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch", "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch", ], }, ], threats: [ { category: "impact", date: "2019-04-03T01:50:46Z", details: "moderate", }, ], title: "CVE-2019-3828", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.