Security update for ansible

SUSE Security Update: Security update for ansible
Announcement ID: SUSE-SU-2018:4130-1
Rating: moderate
References: #1097775 #1099805 #1099808
Cross-References: CVE-2018-10855 CVE-2018-10874 CVE-2018-10875
Affected Products:
  • SUSE OpenStack Cloud Crowbar 8
  • SUSE OpenStack Cloud 8
  • HPE Helion Openstack 8

An update that fixes three vulnerabilities is now available.


This update for ansible fixes the following issues:
Ansible was updated to ansible
The full release notes can be found on:
Security issues fixed:

  • CVE-2018-10875: ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. (bsc#1099808)
  • CVE-2018-10874: It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. (bsc#1099805)
  • CVE-2018-10855: Ansible did not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. (bsc#1097775)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2018-2943=1
  • SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2018-2943=1
  • HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2018-2943=1

Package List:

  • SUSE OpenStack Cloud Crowbar 8 (noarch):
    • ansible-
  • SUSE OpenStack Cloud 8 (noarch):
    • ansible-
  • HPE Helion Openstack 8 (noarch):
    • ansible-