Summary: | <app-admin/ansible-{1.9.6,2.0.2.0-r1}: Code execution vulnerability in lxc_container (CVE-2016-3096) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | chainsaw, pinkbyte, prometheanfire |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1322925 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 580126 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() as per redhat's bugzilla (fixes) Will be in upstream releases 1.9.6, 2.0.2, and 2.1.0. CVE-2016-3096 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096): The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory. 2.1.0.0 does not get marked stable. New GLSA request filed. This issue was resolved and addressed in GLSA 201607-14 at https://security.gentoo.org/glsa/201607-14 by GLSA coordinator Aaron Bauman (b-man). @maintainer(s), reopening for cleanup. Cleanup is done |