Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ansible
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ansible
ID: SUSE-SU-2018:4130-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud Crowbar 8, SUSE HPE Helion Openstack 8, SUSE OpenStack Cloud 8
Datum: Fr, 14. Dezember 2018, 23:16
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10874
Applikationen: Ansible

Originalnachricht

   SUSE Security Update: Security update for ansible
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:4130-1
Rating: moderate
References: #1097775 #1099805 #1099808
Cross-References: CVE-2018-10855 CVE-2018-10874 CVE-2018-10875

Affected Products:
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 8
HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for ansible fixes the following issues:

Ansible was updated to ansible 2.4.6.0.

The full release notes can be found on:

https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md

Security issues fixed:

- CVE-2018-10875: ansible.cfg is read from the current working directory
which can be altered to make it point to a plugin or a module path under
the control of an attacker, thus allowing the attacker to execute
arbitrary code. (bsc#1099808)
- CVE-2018-10874: It was found that inventory variables are loaded from
current working directory when running ad-hoc command which are under
attacker's control, allowing to run arbitrary code as a result.
(bsc#1099805)
- CVE-2018-10855: Ansible did not honor the no_log task flag for failed
tasks. When the no_log flag has been used to protect sensitive data
passed to a task from being logged, and that task does not run
successfully, Ansible will expose sensitive data in log files and on the
terminal of the user running Ansible. (bsc#1097775)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud Crowbar 8:

zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2018-2943=1

- SUSE OpenStack Cloud 8:

zypper in -t patch SUSE-OpenStack-Cloud-8-2018-2943=1

- HPE Helion Openstack 8:

zypper in -t patch HPE-Helion-OpenStack-8-2018-2943=1



Package List:

- SUSE OpenStack Cloud Crowbar 8 (noarch):

ansible-2.4.6.0-3.3.1

- SUSE OpenStack Cloud 8 (noarch):

ansible-2.4.6.0-3.3.1

- HPE Helion Openstack 8 (noarch):

ansible-2.4.6.0-3.3.1


References:

https://www.suse.com/security/cve/CVE-2018-10855.html
https://www.suse.com/security/cve/CVE-2018-10874.html
https://www.suse.com/security/cve/CVE-2018-10875.html
https://bugzilla.suse.com/1097775
https://bugzilla.suse.com/1099805
https://bugzilla.suse.com/1099808

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung