Bug 2318271 (CVE-2024-9902)
Summary: | CVE-2024-9902 ansible-core: Ansible-core user may read/write unauthorized content | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | brking, eglynn, haoli, hkataria, jajackso, jcammara, jjoyce, jmitchel, jneedle, jschluet, kegrant, koliveir, kshier, lhh, lsvaty, mabashia, mburns, mgarciac, mihai.albert, pbraun, pgrist, rhos-maint, security-response-team, shrjoshi, shvarugh, simaishi, smcdonal, stcannon, teagle, tfister, thavo, tvignaud, yguenane |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2333128 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2024-10-12 02:47:40 UTC
Was it resolved upstream? I don't see any JIRA or Bugzilla trackers for our ansible products - is that an oversight? It was, and it's referenced in changelogs and commits, but the Ansible community does not apparently issue GHSAs In any case, this is not embargoed; there's public commits mentioning this issue. This issue has been addressed in the following products: Ansible Automation Platform Execution Environments Via RHSA-2024:8969 https://access.redhat.com/errata/RHSA-2024:8969 Is this vulnerability applying also ansible-2.9.27-1.el8ae.noarch (cli mode only)? This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.5 for RHEL 8 Red Hat Ansible Automation Platform 2.5 for RHEL 9 Via RHSA-2024:9894 https://access.redhat.com/errata/RHSA-2024:9894 This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 8 Red Hat Ansible Automation Platform 2.4 for RHEL 9 Via RHSA-2024:10762 https://access.redhat.com/errata/RHSA-2024:10762 This issue has been addressed in the following products: Red Hat OpenStack Platform 17.1 for RHEL 9 Via RHSA-2025:1861 https://access.redhat.com/errata/RHSA-2025:1861 |