Security update for ansible
|References:||#1097775 #1099805 #1099808|
|Cross-References:||CVE-2018-10855 CVE-2018-10874 CVE-2018-10875|
|Affected Products:|| |
An update that fixes three vulnerabilities is now available.
This update for ansible fixes the following issues:
Ansible was updated to ansible 22.214.171.124.
The full release notes can be found on:
Security issues fixed:
- CVE-2018-10875: ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. (bsc#1099808)
- CVE-2018-10874: It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. (bsc#1099805)
- CVE-2018-10855: Ansible did not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. (bsc#1097775)
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2018-2943=1
- SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2018-2943=1
- HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2018-2943=1
- SUSE OpenStack Cloud Crowbar 8 (noarch):
- SUSE OpenStack Cloud 8 (noarch):
- HPE Helion Openstack 8 (noarch):