Ubuntu alert USN-6846-1 (ansible)
| From: | Amir Naseredini <amir.naseredini@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-6846-1] Ansible vulnerabilities | |
| Date: | Tue, 25 Jun 2024 15:25:14 +0100 | |
| Message-ID: | <151144ea-8bef-4e9e-ae4c-43593ceb9c47@canonical.com> |
========================================================================== Ubuntu Security Notice USN-6846-1 June 25, 2024 ansible vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Ansible. Software Description: - ansible: Configuration management, deployment, and task execution system Details: It was discovered that Ansible incorrectly handled certain inputs when using tower_callback parameter. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-3697) It was discovered that Ansible incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a Template Injection. (CVE-2023-5764) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS ansible 2.10.7+merged+base+2.10.8+dfsg-1ubuntu0.1~esm4 Available with Ubuntu Pro Ubuntu 20.04 LTS ansible 2.9.6+dfsg-1ubuntu0.1~esm2 Available with Ubuntu Pro Ubuntu 18.04 LTS ansible 2.5.1+dfsg-1ubuntu0.1+esm2 Available with Ubuntu Pro Ubuntu 16.04 LTS ansible 2.0.0.2-2ubuntu1.3+esm2 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6846-1 CVE-2022-3697, CVE-2023-5764
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsD5BAABCAAjFiEELRdhz3KY7FGicMD8Vjg+NdFTuLIFAmZ600oFAwAAAAAACgkQVjg+NdFTuLJ4 xwwAp6WlPDsU5m9X99MTD37dNsbAP440rjhI2BJA0y7dPs4ctZhsP5AZ0Ctl3FBWsN5xICfqBwva 3eSi1CgKEl3BPwVwDQ0Ge8YHmGDEO9DlZzJ6Q+CLoXuuJDx4h3FjhhJ0EMHAPWYIu3d3dTbttvCf Iq2VCVQYkG7yrvXhjvG3uN66ZUxsnoIYJSiT2QgJnXItCea7gQRbZKti0pmumi+8vzABvMZx1/cS qqI9YF/+bJALQ/hsZmQGJhn3Q4+NTTXqQC1pjtRnvqKfmLVbHEhLy0pK3vFr1+pgwI0rNbVUbBhE 2QSp7id3GwR4tgr9HsLBJFkN9rOMXaqp18UW8+82enxVasSOYw1SwsEltDZpw4ioNmpWmDzWCwbr KiEyuywLIH6J2W3WiFXbHj5No3hHv/z18f9ArL8P2qCHqoZhM2fbgNQSP4KNi9AWwZzBOGsAUk+R uoSi/sa2J/iPapcYlD7EzldM8hoGhn1eumFvQP0mEIfz62dUikmPTW5YWJJV =k450 -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)