First published: Thu Oct 18 2018(Updated: )
"User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Engine | =2.0 | |
Redhat Ansible Engine | =2.5 | |
Redhat Ansible Engine | =2.6 | |
Redhat Ansible Engine | =2.7 | |
Redhat Ansible Tower | =3.3.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
redhat/ansible-engine | <2.7.1 | 2.7.1 |
redhat/ansible-engine | <2.6.7 | 2.6.7 |
redhat/ansible-engine | <2.5.11 | 2.5.11 |
All of | ||
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
debian/ansible | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 7.7.0+dfsg-3+deb12u1 10.1.0+dfsg-1 | |
pip/ansible | >=0<2.5.11 | 2.5.11 |
pip/ansible | >=2.6.0a1<2.6.7 | 2.6.7 |
pip/ansible | >=2.7.0a1<2.7.1 | 2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16837 is a vulnerability in the Ansible "User" module that leaks any data passed as a parameter to ssh-keygen.
The severity level of CVE-2018-16837 is high.
The affected software versions include Ansible 2.5.1, 2.8.0, 2.0.0.2-2ubuntu1.3, 2.7.1, 2.6.7, and Redhat Ansible Engine 2.0, 2.5, 2.6, 2.7, and Redhat Ansible Tower 3.3.0.
To fix CVE-2018-16837, update Ansible to versions 2.7.7+dfsg-1+deb10u1, 2.10.7+merged+base+2.10.8+dfsg-1, 7.3.0+dfsg-1, or 7.7.0+dfsg-3.
You can find more information about CVE-2018-16837 at the following references: [MITRE CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16837), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16837), and [Ansible GitHub Pull Request](https://github.com/ansible/ansible/pull/47436).