Mageia 2018-0439: ansible security update
Summary
It was found that inventory variables are loaded from current working
directory when running ad-hoc command which are under attacker's
control, allowing to run arbitrary code as a result (CVE-2018-10874).
It was found that ansible.cfg is being read from the current working
directory, which can be made to point to plugin or module paths that are
under control of the attacker. This could allow an attacker to execute
arbitrary code (CVE-2018-10875).
References
- https://bugs.mageia.org/show_bug.cgi?id=23321
- https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DXWC5D7CU2JQAN3QB3BCCLZMZLTI2N6W/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10875
Resolution
MGASA-2018-0439 - Updated ansible package fixes security vulnerabilities
SRPMS
- 6/core/ansible-2.4.6.0-1.1.mga6