|
|
Subscribe / Log in / New account

Ubuntu alert USN-6846-2 (ansible)

From:  Vyom Yadav <vyom.yadav@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-6846-2] Ansible regression
Date:  Mon, 02 Dec 2024 16:11:06 +0530
Message-ID:  <370cfd38-bb46-4890-8a4d-d98906935945@canonical.com>

========================================================================== Ubuntu Security Notice USN-6846-2 December 02, 2024 ansible regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-6846-1 caused some regression in ansible. Software Description: - ansible: Configuration management, deployment, and task execution system Details: USN-6846-1 fixed vulnerabilities in ansible. The update introduced a regression in ansible. This update fixes the problem. We apologize for the inconvenience. Original advisory details:  It was discovered that Ansible incorrectly handled certain inputs when  using tower_callback parameter. If a user or an automated system were  tricked into opening a specially crafted input file, a remote attacker  could possibly use this issue to obtain sensitive information. This issue  only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.  (CVE-2022-3697)  It was discovered that Ansible incorrectly handled certain inputs. If a  user or an automated system were tricked into opening a specially crafted  input file, a remote attacker could possibly use this issue to perform a  Template Injection. (CVE-2023-5764) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS   ansible                         2.5.1+dfsg-1ubuntu0.1+esm3                                   Available with Ubuntu Pro Ubuntu 16.04 LTS   ansible                         2.0.0.2-2ubuntu1.3+esm3                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References:   https://ubuntu.com/security/notices/USN-6846-2   https://ubuntu.com/security/notices/USN-6846-1   https://launchpad.net/bugs/2073569


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQSV2d7RU755utSnx3O7Ba3EKYsoKQUCZ02OwgUDAAAAAAAKCRC7Ba3EKYsoKdVR AP9aZJsRtriRSZuhMXw8fkuF4lp1OlLiZF+s47Q1DLUHggD/erIxIXkl0M4t/p+KEc4G2aWIF4XI DnLLr8qMutnkpQ4= =qQVJ -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds