Upstream information

CVE-2015-3908 at MITRE

Description

Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entries: 938161 [RESOLVED], 938399 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • ansible >= 2.2.0.0-1.1
Patchnames:
openSUSE Tumbleweed GA ansible


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 ansible Analysis
HPE Helion OpenStack 8 ansible1 Analysis
SUSE Manager Client Tools Beta for SLE 15 ansible In progress
SUSE Manager Client Tools for SLE 15 ansible In progress
SUSE OpenStack Cloud 7 ansible In progress
SUSE OpenStack Cloud 8 ansible Analysis
SUSE OpenStack Cloud 8 ansible1 Analysis
SUSE OpenStack Cloud 9 ansible1 Analysis
SUSE OpenStack Cloud Crowbar 8 ansible Analysis