Bug 1676689 (CVE-2019-3828)
Summary: | CVE-2019-3828 Ansible: path traversal in the fetch module | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Borja Tarraso <btarraso> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | a.badger, abhgupta, ahardin, amctagga, anharris, aos-bugs, athmanem, bleanhar, bniver, ccoleman, dajohnso, dbaker, dbecker, dedgar, dmetzger, dominik.mierzejewski, eparis, flucifre, gblomqui, gmainwar, gmccullo, gmeno, gtanzill, jcammara, jfrey, jgoulding, jhardy, jjoyce, jlaska, jokerman, jprause, jschluet, jtanner, kbasil, kdixon, kevin, lhh, lpeer, maxim, mbenjamin, mburns, mchappel, mhackett, mmccomas, mrike, obarenbo, ohadlevy, rcosta, rhos-maint, roliveri, sclewis, simaishi, sisharma, slinaber, smunilla, ssaha, sthangav, tbielawa, tkuratom, trankin, tvignaud, vbellur, vereddy |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ansible-engine 2.5.15, ansible-engine 2.6.14, ansible-engine 2.7.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A path traversal flaw was found in ansible. The fetch module allows copying and overwriting files outside of the specified destination in the local ansible controller host by not restricting an absolute path. The main threat from this vulnerability is to data confidentiality and integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:47:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1693271, 1676690, 1677201, 1677202, 1677203, 1677519, 1677520, 1677521, 1677596, 1677597, 1677598, 1679905, 1679906 | ||
Bug Blocks: | 1675477 |
Description
Borja Tarraso
2019-02-12 21:26:12 UTC
Acknowledgments: Name: Kevin Backhouse (Semmle Security Research Team) Created ansible tracking bugs for this issue: Affects: epel-all [bug 1677598] Affects: fedora-all [bug 1677597] This issue has been addressed in the following products: Red Hat Ansible Engine 2 for RHEL 7 Via RHSA-2019:0430 https://access.redhat.com/errata/RHSA-2019:0430 This issue has been addressed in the following products: Red Hat Ansible Engine 2.7 for RHEL 7 Via RHSA-2019:0431 https://access.redhat.com/errata/RHSA-2019:0431 This issue has been addressed in the following products: Red Hat Ansible Engine 2.5 for RHEL 7 Via RHSA-2019:0432 https://access.redhat.com/errata/RHSA-2019:0432 This issue has been addressed in the following products: Red Hat Ansible Engine 2.6 for RHEL 7 Via RHSA-2019:0433 https://access.redhat.com/errata/RHSA-2019:0433 External References: https://github.com/ansible/ansible/pull/52133 Statement: Red Hat CloudForms 4.5 and 4.6 are now in Maintenance Support Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat CloudForms Life Cycle: https://access.redhat.com/support/policy/updates/cloudforms/ This issue has been addressed in the following products: Red Hat OpenStack Platform 14.0 (Rocky) Via RHSA-2019:3744 https://access.redhat.com/errata/RHSA-2019:3744 This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2019:3789 https://access.redhat.com/errata/RHSA-2019:3789 |