Bug 1831263 (CVE-2014-4657)
| Summary: | CVE-2014-4657 ansible: improper restriction of code subset allows remote arbitrary code execution via crafted instructions | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | msiddiqu |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | unspecified | CC: | a.badger, akarol, bcoca, cmeyers, dbecker, dmetzger, gblomqui, gmainwar, gmccullo, gtanzill, hvyas, jcammara, jfrey, jhardy, jjoyce, jschluet, jtanner, kbasil, kevin, lhh, lpeer, mabashia, maxim, mburns, notting, obarenbo, puebele, rhos-maint, roliveri, rpetrell, sclewis, sdoran, simaishi, slinaber, smallamp, smcdonal, tkuratom, tvignaud, vbellur |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | ansible-core 1.5.5 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in the safe_eval function in Ansible before 1.5.4, where it does not properly restrict the code subset. This flaw allows remote attackers to execute arbitrary code via crafted instructions.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-05-05 22:31:58 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1831264, 1831265 | ||
| Bug Blocks: | 1831266 | ||
|
Description
msiddiqu
2020-05-04 18:48:32 UTC
Created ansible tracking bugs for this issue: Affects: epel-all [bug 1831265] Affects: fedora-all [bug 1831264] Red Hat CloudForms 5.10 (4.7) and 5.11 (5.0) do not ship `ansible` package, it is provided by the official Ansible repository. This is a bug for Ansible 1.5.4 and previous versions, really old, and fixed on 1.5.5 and after long time ago, when it was Ansible Core. Currently we support 2.9.x, 2.8.x, and 2.7.x. and from 2.4 it is called Ansible Engine. So Ansible in all supported current versions is not affected. Red Hat Ceph Storage and Red Hat Gluster Storage shipped ansible versions 2.4.1 and 2.3.2 respectively, which already contains the fix and hence not affected by this vulnerability. External References: https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md https://www.securityfocus.com/bid/68232 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2014-4657 |