<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ansible</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1858-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-08-13T14:05:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-08-13T14:05:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-08-13T14:05:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ansible</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ansible fixes the following issues:

Ansible was updated to version 2.8.1:

Full changelog is at /usr/share/doc/packages/ansible/changelogs/

- Bugfixes

  - ACI - DO not encode query_string
  - ACI modules - Fix non-signature authentication
  - Add missing directory provided via ``--playbook-dir`` to adjacent collection loading
  - Fix 'Interface not found' errors when using eos_l2_interface with nonexistant
    interfaces configured
  - Fix cannot get credential when `source_auth` set to `credential_file`.
  - Fix netconf_config backup string issue
  - Fix privilege escalation support for the docker connection plugin when
    credentials need to be supplied (e.g. sudo with password).
  - Fix vyos cli prompt inspection
  - Fixed loading namespaced documentation fragments from collections.
  - Fixing bug came up after running cnos_vrf module against coverity.
  - Properly handle data importer failures on PVC creation, instead of timing out.
  - To fix the ios static route TC failure in CI
  - To fix the nios member module params
  - To fix the nios_zone module idempotency failure
  - add terminal initial prompt for initial connection
  - allow include_role to work with ansible command
  - allow python_requirements_facts to report on dependencies containing dashes
  - asa_config fix
  - azure_rm_roledefinition - fix a small error in build scope.
  - azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network
    peering.
  - cgroup_perf_recap - When not using file_per_task, make sure we don't
    prematurely close the perf files
  - display underlying error when reporting an invalid ``tasks:`` block.
  - dnf - fix wildcard matching for state: absent
  - docker connection plugin - accept version ``dev`` as 'newest version' and
    print warning.
  - docker_container - ``oom_killer`` and ``oom_score_adj`` options are available
    since docker-py 1.8.0, not 2.0.0 as assumed by the version check.
  - docker_container - fix network creation when ``networks_cli_compatible`` is
    enabled.
  - docker_container - use docker API's ``restart`` instead of ``stop``/``start``
    to restart a container.
  - docker_image - if ``build`` was not specified, the wrong default for
    ``build.rm`` is used.
  - docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the
    module failed.
  - docker_image - module failed when ``source: build`` was set but
    ``build.path`` options not specified.
  - docker_network module - fix idempotency when using ``aux_addresses`` in
    ``ipam_config``.
  - ec2_instance - make Name tag idempotent
  - eos: don't fail modules without become set, instead show message and continue
  - eos_config: check for session support when asked to 'diff_against: session'
  - eos_eapi: fix idempotency issues when vrf was unspecified.
  - fix bugs for ce - more info see
  - fix incorrect uses of to_native that should be to_text instead.
  - hcloud_volume - Fix idempotency when attaching a server to a volume.
  - ibm_storage - Added a check for null fields in ibm_storage utils module.
  - include_tasks - whitelist ``listen`` as a valid keyword
  - k8s - resource updates applied with force work correctly now
  - keep results subset also when not no_log.
  - meraki_switchport - improve reliability with native VLAN functionality.
  - netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
    clearing functionality
  - netapp_e_volumes - fix workload profileId indexing when no previous workload
    tags exist on the storage array.
  - nxos_acl some platforms/versions raise when no ACLs are present
  - nxos_facts fix &lt;https://github.com/ansible/ansible/pull/57009&gt;
  - nxos_file_copy fix passwordless workflow
  - nxos_interface Fix admin_state check for n6k
  - nxos_snmp_traps fix group all for N35 platforms
  - nxos_snmp_user fix platform fixes for get_snmp_user
  - nxos_vlan mode idempotence bug
  - nxos_vlan vlan names containing regex ctl chars should be escaped
  - nxos_vtp_* modules fix n6k issues
  - openssl_certificate - fix private key passphrase handling for
    ``cryptography`` backend.
  - openssl_pkcs12 - fixes crash when private key has a passphrase and the module
    is run a second time.
  - os_stack - Apply tags conditionally so that the module does not throw up an
    error when using an older distro of openstacksdk
  - pass correct loading context to persistent connections other than local
  - pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
  - postgresql - added initial SSL related tests
  - postgresql - added missing_required_libs, removed excess param mapping
  - postgresql - move connect_to_db and get_pg_version into
    module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)
  - postgresql_db - add note to the documentation about state dump and the
    incorrect rc (https://github.com/ansible/ansible/pull/57297)
  - postgresql_db - fix for postgresql_db fails if stderr contains output
  - postgresql_ping - fixed a typo in the module documentation
  - preserve actual ssh error when we cannot connect.
  - route53_facts - the module did not advertise check mode support, causing it
    not to be run in check mode.
  - sysctl: the module now also checks the output of STDERR to report if values
    are correctly set (https://github.com/ansible/ansible/pull/55695)
  - ufw - correctly check status when logging is off
  - uri - always return a value for status even during failure
  - urls - Handle redirects properly for IPv6 address by not splitting on ``:``
    and rely on already parsed hostname and port values
  - vmware_vm_facts - fix the support with regular ESXi
  - vyos_interface fix &lt;https://github.com/ansible/ansible/pull/57169&gt;
  - we don't really need to template vars on definition as we do this on demand
    in templating.
  - win_acl - Fix qualifier parser when using UNC paths -
  - win_hostname - Fix non netbios compliant name handling
  - winrm - Fix issue when attempting to parse CLIXML on send input failure
  - xenserver_guest - fixed an issue where VM whould be powered off even though
    check mode is used if reconfiguration requires VM to be powered off.
  - xenserver_guest - proper error message is shown when maximum number of
    network interfaces is reached and multiple network interfaces are added at
    once.
  - yum - Fix false error message about autoremove not being supported
  - yum - fix failure when using ``update_cache`` standalone
  - yum - handle special '_none_' value for proxy in yum.conf and .repo files

Update to version 2.8.0

Major changes:

  * Experimental support for Ansible Collections and content namespacing -
    Ansible content can now be packaged in a collection and addressed via
    namespaces. This allows for easier sharing, distribution, and installation
    of bundled modules/roles/plugins, and consistent rules for accessing
    specific content via namespaces.
  * Python interpreter discovery - The first time a Python module runs on a
    target, Ansible will attempt to discover the proper default Python
    interpreter to use for the target platform/version (instead of immediately
    defaulting to /usr/bin/python). You can override this behavior by
    setting ansible_python_interpreter or via config. 
    (see https://github.com/ansible/ansible/pull/50163)
  * become - The deprecated CLI arguments for --sudo, --sudo-user,
    --ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in
    favor of the more generic --become, --become-user, --become-method, and
    --ask-become-pass.
  * become - become functionality has been migrated to a plugin architecture,
    to allow customization of become functionality and 3rd party become methods
    (https://github.com/ansible/ansible/pull/50991)

- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837

For the full changelog see /usr/share/doc/packages/ansible/changelogs or online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst


This update was imported from the openSUSE:Leap:15.1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1858</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1858-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109957</URL>
      <Description>SUSE Bug 1109957</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112959</URL>
      <Description>SUSE Bug 1112959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118896</URL>
      <Description>SUSE Bug 1118896</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1126503</URL>
      <Description>SUSE Bug 1126503</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16837/</URL>
      <Description>SUSE CVE CVE-2018-16837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16859/</URL>
      <Description>SUSE CVE CVE-2018-16859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16876/</URL>
      <Description>SUSE CVE CVE-2018-16876 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3828/</URL>
      <Description>SUSE CVE CVE-2019-3828 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP1">
        <FullProductName ProductID="SUSE Package Hub 15 SP1">SUSE Package Hub 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ansible-2.8.1-bp151.3.3.1">
      <FullProductName ProductID="ansible-2.8.1-bp151.3.3.1">ansible-2.8.1-bp151.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ansible-2.8.1-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP1">
      <FullProductName ProductID="SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1">ansible-2.8.1-bp151.3.3.1 as a component of SUSE Package Hub 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.</Note>
    </Notes>
    <CVE>CVE-2018-16837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16837.html</URL>
        <Description>CVE-2018-16837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112959</URL>
        <Description>SUSE Bug 1112959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-16859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16859.html</URL>
        <Description>CVE-2018-16859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109957</URL>
        <Description>SUSE Bug 1109957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116587</URL>
        <Description>SUSE Bug 1116587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.</Note>
    </Notes>
    <CVE>CVE-2018-16876</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16876.html</URL>
        <Description>CVE-2018-16876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109957</URL>
        <Description>SUSE Bug 1109957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118896</URL>
        <Description>SUSE Bug 1118896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.</Note>
    </Notes>
    <CVE>CVE-2019-3828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3828.html</URL>
        <Description>CVE-2019-3828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126503</URL>
        <Description>SUSE Bug 1126503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1164137</URL>
        <Description>SUSE Bug 1164137</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
