|
|
Subscribe / Log in / New account

Ubuntu alert USN-6846-3 (ansible)

From:  Vyom Yadav <vyom.yadav@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-6846-3] Ansible regression
Date:  Thu, 13 Feb 2025 16:30:44 +0530
Message-ID:  <d72f24e4-a6b3-4aea-9cb7-af09a61f61fd@canonical.com>

========================================================================== Ubuntu Security Notice USN-6846-3 February 13, 2025 ansible regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-6846-2 caused some regression in ansible. Software Description: - ansible: Configuration management, deployment, and task execution system Details: USN-6846-1 fixed vulnerabilities in ansible. The update introduced a regression in ansible. This update fixes the problem. We apologize for the inconvenience. Original advisory details:  It was discovered that Ansible incorrectly handled certain inputs when  using tower_callback parameter. If a user or an automated system were  tricked into opening a specially crafted input file, a remote attacker  could possibly use this issue to obtain sensitive information. This issue  only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.  (CVE-2022-3697)  It was discovered that Ansible incorrectly handled certain inputs. If a  user or an automated system were tricked into opening a specially crafted  input file, a remote attacker could possibly use this issue to perform a  Template Injection. (CVE-2023-5764) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS   ansible                         2.5.1+dfsg-1ubuntu0.1+esm4                                   Available with Ubuntu Pro Ubuntu 16.04 LTS   ansible                         2.0.0.2-2ubuntu1.3+esm4                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References:   https://ubuntu.com/security/notices/USN-6846-3   https://ubuntu.com/security/notices/USN-6846-2   https://ubuntu.com/security/notices/USN-6846-1   https://launchpad.net/bugs/2097504


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQSV2d7RU755utSnx3O7Ba3EKYsoKQUCZ63Q3AUDAAAAAAAKCRC7Ba3EKYsoKdGC AQDhwFsrk6hLJXdoHOt05+c3MYoIFIaYnC0srqExoszz2AD+JdbXX0FUuIowTrZib8pVN1R9IG+u qKXHDIILgiuxeAs= =zNnn -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds