MGASA-2018-0439

Source
https://advisories.mageia.org/MGASA-2018-0439.html
Import Source
https://advisories.mageia.org/MGASA-2018-0439.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0439
Related
Published
2018-11-11T21:09:54Z
Modified
2018-11-11T20:41:05Z
Summary
Updated ansible package fixes security vulnerabilities
Details

It was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result (CVE-2018-10874).

It was found that ansible.cfg is being read from the current working directory, which can be made to point to plugin or module paths that are under control of the attacker. This could allow an attacker to execute arbitrary code (CVE-2018-10875).

References
Credits

Affected packages

Mageia:6 / ansible

Package

Name
ansible
Purl
pkg:rpm/mageia/ansible?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.6.0-1.1.mga6

Ecosystem specific

{
    "section": "core"
}