Updated ansible package fixes security vulnerabilities
Publication date: 11 Nov 2018Modification date: 11 Nov 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-10874 , CVE-2018-10875
Description
It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result (CVE-2018-10874). It was found that ansible.cfg is being read from the current working directory, which can be made to point to plugin or module paths that are under control of the attacker. This could allow an attacker to execute arbitrary code (CVE-2018-10875).
References
- https://bugs.mageia.org/show_bug.cgi?id=23321
- https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DXWC5D7CU2JQAN3QB3BCCLZMZLTI2N6W/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10875
SRPMS
6/core
- ansible-2.4.6.0-1.1.mga6