Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 26 Jun 2014 14:18:02 -0400 (EDT)
From: cve-assign@...re.org
To: misc@...b.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Ansible CVE requests

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://lwn.net/Articles/603205/

> https://bugs.mageia.org/show_bug.cgi?id=13278#c2

> just in case, seems that it is this patch for "Security fix for safe_eval" :
> https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c

> and for Security fix for vault :
> https://github.com/ansible/ansible/commit/a0e027fe362fbc209dbeff2f72d6e95f39885c69

> and for apt :
> https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08

(Note that 603205 isn't a complete list of the upstream Ansible
vulnerabilities because Mageia is shipping a 1.4.x version and
therefore wasn't interested in
a0e027fe362fbc209dbeff2f72d6e95f39885c69.)

We think 998793fd0ab55705d57527a38cee5e83f535974c is about fixing one
type of issue, but feel free to identify any additional types of
issues that are also fixed. Use CVE-2014-4657 for the general topic of
"the product intentionally allows code execution of code with limited
capabilities, but the code restrictions are insufficient."
https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
suggests that this was fixed in 1.5.4.


a0e027fe362fbc209dbeff2f72d6e95f39885c69 seems to be a
straightforward case of "the product creates files that normally
contain secret values, but does not ensure appropriate permissions."
Use CVE-2014-4658.
https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
suggests that this was fixed in 1.5.5.


c4b5e46054c74176b2446c82d4df1a2610eddc08 is about multiple types of
issues.
https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
suggests that these were fixed in 1.5.5. One issue is doing an
unconditional "chmod 0644" on a file that may have required stronger
permissions for a site-specific reason. Use CVE-2014-4659.


Also, the changes related to _strip_username_password apparently mean
that the product might encounter an /etc/apt/sources.list line
starting with:

  deb http://user:pass@...ver:port/

and would then construct a filename containing the user and pass
fields, leaking credentials in a way that potentially crosses
privilege boundaries. Use CVE-2014-4660.


Does anyone want a CVE ID for this third potential
c4b5e46054c74176b2446c82d4df1a2610eddc08 issue?

The changes related to check_mode apparently mean that
http://docs.ansible.com/developing_modules.html#check-mode wasn't
properly implemented, and an administrator might unintentionally
perform dangerous actions. CVE assignments for this type of problem
seem uncommon, although that might be because the class of issues is
underreported. (The bug here seems to be a case of "doesn't even
notice whether check_mode is active" rather than "notices that
check_mode is active but proceeds unsafely." See also the
http://blog.afistfulofservers.net/post/2012/12/21/promises-lies-and-dryrun-mode/
blog post.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTrGNaAAoJEKllVAevmvmsVEoIAIXaQOpESycBDcQCewvsFxEr
/YTSassxW+SyyWtlL7TqVTBC6K+1B6ry+dQRA/pRbbECV1iUUOLwrsuD23kLTZG4
idP6YM3AXJw8Qm69nAmiMsGBYubl/97V92DY5AwQMnXXASDEfrT2A+Ei6w8zrCCC
VdJ50jus0Ttq0mch9QasGhzPm7w4Np4m2WF9Wpau1N0ZZTWvgf9srNmjHVQW1SS3
5Ait3ALjn15AfLPmZZ9Z059xqjnaVZwBcOHrDpApmctngF3Axej5JXIGNQEfkGtU
Z0Z8sTKbPEJ4GUo0KykJTuJcGMBpgZ+ad2gv5+vCy8ufdpHoLHyKf1aEo39gekc=
=evpQ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.