Gentoo: GLSA-201607-14: Ansible: Privilege escalation
Summary
The create_script function in the lxc_container module of Ansible uses predictable temporary file names, making it vulnerable to a symlink attack.
Resolution
All Ansible 1.9.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/ansible-1.9.6"
All Ansible 2.0.2.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/ansible-2.0.2.0-r1"
References
[ 1 ] CVE-2016-3096 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-14
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Synopsis
A vulnerability in Ansible may allow local attackers to gain escalated privileges or write arbitrary files.
Background
Ansible is a radically simple IT automation platform.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-admin/ansible < 1.9.6 >= 1.9.6
Impact
===== Local attackers could write arbitrary files or gain escalated privileges within the container.
Workaround
There is no known workaround at this time.