SUSE-SU-2018:4130-1: moderate: Security update for ansible

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Dec 14 13:11:19 MST 2018


   SUSE Security Update: Security update for ansible
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:4130-1
Rating:             moderate
References:         #1097775 #1099805 #1099808 
Cross-References:   CVE-2018-10855 CVE-2018-10874 CVE-2018-10875
                   
Affected Products:
                    SUSE OpenStack Cloud Crowbar 8
                    SUSE OpenStack Cloud 8
                    HPE Helion Openstack 8
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for ansible fixes the following issues:

   Ansible was updated to ansible 2.4.6.0.

   The full release notes can be found on:

   	https://github.com/ansible/ansible/blob/stable-2.4/CHANGELOG.md

   Security issues fixed:

   - CVE-2018-10875: ansible.cfg is read from the current working directory
     which can be altered to make it point to a plugin or a module path under
     the control of an attacker, thus allowing the attacker to execute
     arbitrary code. (bsc#1099808)
   - CVE-2018-10874: It was found that inventory variables are loaded from
     current working directory when running ad-hoc command which are under
     attacker's control, allowing to run arbitrary code as a result.
     (bsc#1099805)
   - CVE-2018-10855: Ansible did not honor the no_log task flag for failed
     tasks. When the no_log flag has been used to protect sensitive data
     passed to a task from being logged, and that task does not run
     successfully, Ansible will expose sensitive data in log files and on the
     terminal of the user running Ansible. (bsc#1097775)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 8:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2018-2943=1

   - SUSE OpenStack Cloud 8:

      zypper in -t patch SUSE-OpenStack-Cloud-8-2018-2943=1

   - HPE Helion Openstack 8:

      zypper in -t patch HPE-Helion-OpenStack-8-2018-2943=1



Package List:

   - SUSE OpenStack Cloud Crowbar 8 (noarch):

      ansible-2.4.6.0-3.3.1

   - SUSE OpenStack Cloud 8 (noarch):

      ansible-2.4.6.0-3.3.1

   - HPE Helion Openstack 8 (noarch):

      ansible-2.4.6.0-3.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-10855.html
   https://www.suse.com/security/cve/CVE-2018-10874.html
   https://www.suse.com/security/cve/CVE-2018-10875.html
   https://bugzilla.suse.com/1097775
   https://bugzilla.suse.com/1099805
   https://bugzilla.suse.com/1099808



More information about the sle-security-updates mailing list