摘要:
ansible security update
安全等级: High
公告ID: KylinSec-SA-2025-1630
发布日期: 2025年3月18日
关联CVE: CVE-2022-3697 CVE-2023-5115
Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. %if 0 Provides: ansible-python3 = - Obsoletes: ansible-python3 < - BuildRequires: python3-devel python3-setuptools BuildRequires: python3-PyYAML python3-paramiko python3-crypto python3-packaging BuildRequires: python3-pexpect python3-winrm BuildRequires: git-core %if %with_docs BuildRequires: python3-sphinx python3-sphinx-theme-alabaster asciidoc %endif BuildRequires: python3-six python3-nose python3-pytest python3-pytest-xdist BuildRequires: python3-pytest-mock python3-requests python3-coverage python3-mock BuildRequires: python3-boto3 python3-botocore python3-passlib python3-jinja2 Requires: python3-PyYAML python3-paramiko python3-crypto python3-setuptools python3-six Requires: python3-jinja2 sshpass python3-jmespath %description Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. This package installs versions of ansible that execute on Python3. %endif
Security Fix(es):
A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.(CVE-2022-3697)
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.(CVE-2023-5115)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-3697 | KY3.4-5A | ansible | Fixed |
CVE-2022-3697 | V6 | ansible | Fixed |
CVE-2023-5115 | KY3.4-5A | ansible | Fixed |
CVE-2023-5115 | V6 | ansible | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
ansible | noarch | 2.5.5-8.kb1.ky3_4 |
ansible-help | noarch | 2.5.5-8.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
ansible | noarch | 2.9.27-7.ks6 |
ansible-doc | noarch | 2.9.27-7.ks6 |
ansible-test | noarch | 2.9.27-7.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名