Bug 1388038 (CVE-2016-8614)

Summary: CVE-2016-8614 ansible: Improper verification of key fingerprints in apt_key module
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aortega, apevec, arubin, ayoung, bleanhar, ccoleman, chrisw, cvsbot-xmlrpc, dedgar, dmcphers, gmollett, jgoulding, jialiu, jjoyce, jkeck, jmatthew, joelsmith, jokerman, jschluet, kbasil, kdube, kseifried, lhh, lmeyer, lpeer, markmc, mmccomas, nthomas, rbryant, sankarshan, sclewis, security-response-team, sgirijan, sisharma, slinaber, smallamp, smohan, ssaha, tcarlin, tdawson, tdecacqu, tsanders, tvignaud, vbellur
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: ansible 2.2.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-11-01 15:28:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1388661, 1390650, 1390651, 1390652, 1390653    
Bug Blocks: 1388042    

Description Adam Mariš 2016-10-24 09:53:58 UTC
It was found that apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

Upstream bug:


Upstream patches:


Comment 4 Kurt Seifried 2016-11-01 15:25:41 UTC
Created ansible1.9 tracking bugs for this issue:

Affects: fedora-all [bug 1390651]
Affects: epel-all [bug 1390653]

Comment 5 Kurt Seifried 2016-11-01 15:26:01 UTC
Created ansible tracking bugs for this issue:

Affects: fedora-all [bug 1390650]
Affects: epel-all [bug 1390652]

Comment 6 Kurt Seifried 2016-11-01 15:28:42 UTC
This issue is addressed in Ansible 2.2.0 available at: