Mageia 2020-0217: ansible security update
Summary
Updated ansible package fixes security vulnerabilities:
A race condition flaw was found in Ansible Engine when running a playbook
with an unprivileged become user. When Ansible needs to run a module with
become user, the temporary directory is created in /var/tmp. This directory
is created with "umask 77 && mkdir -p
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node (CVE-2020-1735).
A flaw was found in the Ansible Engine when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of t...Read the Full Advisory
References
- https://bugs.mageia.org/show_bug.cgi?id=26349
- https://github.com/ansible/ansible/blob/v2.7.17/changelogs/CHANGELOG-v2.7.rst
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/
- https://access.redhat.com/errata/RHSA-2020:1544
- https://access.redhat.com/errata/RHSA-2020:2142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684
Resolution
MGASA-2020-0217 - Updated ansible packages fix security vulnerabilities
SRPMS
- 7/core/ansible-2.7.18-1.mga7