Linux Security
    Linux Security
    Linux Security

    Mageia 2020-0363: ansible security update

    Date
    332
    Posted By
    An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality
    MGASA-2020-0363 - Updated ansible package fixes security vulnerabilities
    
    Publication date: 05 Sep 2020
    URL: https://advisories.mageia.org/MGASA-2020-0363.html
    Type: security
    Affected Mageia releases: 7
    CVE: CVE-2020-14430,
         CVE-2020-14432,
         CVE-2020-14365
    
    An Improper Output Neutralization for Logs flaw was found in Ansible when using
    the uri module, where sensitive data is exposed to content and json output.
    This flaw allows an attacker to access the logs or outputs of performed tasks
    to read keys used in playbooks from other users within the uri module. The
    highest threat from this vulnerability is to data confidentiality
    (CVE-2020-14430).
    
    A flaw was found in the Ansible Engine when using module_args. Tasks executed
    with check mode (--check-mode) do not properly neutralize sensitive data
    exposed in the event data. This flaw allows unauthorized users to read this
    data. The highest threat from this vulnerability is to confidentiality
    (CVE-2020-14432).
    
    A flaw was found in the Ansible Engine when installing packages using the dnf
    module. GPG signatures are ignored during installation even when
    disable_gpg_check is set to False, which is the default behavior. This flaw
    leads to malicious packages being installed on the system and arbitrary code
    executed via package installation scripts. The highest threat from this
    vulnerability is to integrity and system availability (CVE-2020-14365).
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=27175
    - https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it./thread/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/
    - https://access.redhat.com/errata/RHSA-2020:3600
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14430
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14432
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365
    
    SRPMS:
    - 7/core/ansible-2.7.18-1.1.mga7
    

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.