- 发布:
- 2017-07-06
- 已更新:
- 2017-07-17
RHSA-2017:1685 - Security Advisory
概述
Important: ansible security, bug fix, and enhancement update
类型/严重性
Security Advisory: Important
Red Hat Insights 补丁分析
识别并修复受此公告影响的系统。
标题
An update for ansible is now available for RHEV Engine version 4.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
描述
Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
The following packages have been upgraded to a later upstream version: ansible (2.3.0.0). (BZ#1446527)
Security Fix(es):
- An input validation vulnerability was found in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. (CVE-2016-9587)
- An input validation vulnerability was found in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. (CVE-2017-7466)
- An input validation vulnerability was found in Ansible's mysql_user module which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. (CVE-2016-8647)
The CVE-2017-7466 issue was discovered by Evgeni Golov (Red Hat).
解决方案
For details on how to apply this update, which includes the changes described in this advisory, refer to:
受影响的产品
- Red Hat Virtualization 4.1 x86_64
修复
- BZ - 1396174 - CVE-2016-8647 Ansible: in some circumstances the mysql_user module may fail to correctly change a password
- BZ - 1404378 - CVE-2016-9587 Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
- BZ - 1439212 - CVE-2017-7466 ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587)
- BZ - 1446527 - Upgrade ansible to version 2.3.0.0
Red Hat Virtualization 4.1
SRPM | |
---|---|
ansible-2.3.0.0-4.el7.src.rpm | SHA-256: 562e51409fc06db3d2ea69a257c5e6e62d6a32be6a519a33a952e4797d7fdf28 |
x86_64 | |
ansible-2.3.0.0-4.el7.noarch.rpm | SHA-256: 516b996a8fa190c9e8d8c0524604b16d774e0e0e32cc7c7c71add6ad14c45b3a |
ansible-doc-2.3.0.0-4.el7.noarch.rpm | SHA-256: 9e1263df1b87046b468f8fce694bccbc8e8aa3de19718d32c81f4fa71bd93687 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。