• 公告ID (KylinSec-SA-2025-1630)

摘要:

ansible security update

安全等级: High

公告ID: KylinSec-SA-2025-1630

发布日期: 2025年3月18日

关联CVE: CVE-2022-3697   CVE-2023-5115  

  • 详细介绍

1. 漏洞描述

   

Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. %if 0 Provides: ansible-python3 = - Obsoletes: ansible-python3 < - BuildRequires: python3-devel python3-setuptools BuildRequires: python3-PyYAML python3-paramiko python3-crypto python3-packaging BuildRequires: python3-pexpect python3-winrm BuildRequires: git-core %if %with_docs BuildRequires: python3-sphinx python3-sphinx-theme-alabaster asciidoc %endif BuildRequires: python3-six python3-nose python3-pytest python3-pytest-xdist BuildRequires: python3-pytest-mock python3-requests python3-coverage python3-mock BuildRequires: python3-boto3 python3-botocore python3-passlib python3-jinja2 Requires: python3-PyYAML python3-paramiko python3-crypto python3-setuptools python3-six Requires: python3-jinja2 sshpass python3-jmespath %description Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. This package installs versions of ansible that execute on Python3. %endif

Security Fix(es):

A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.(CVE-2022-3697)

An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.(CVE-2023-5115)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-3697 KY3.4-5A ansible Fixed
CVE-2022-3697 V6 ansible Fixed
CVE-2023-5115 KY3.4-5A ansible Fixed
CVE-2023-5115 V6 ansible Fixed

3. 影响组件

    ansible

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
ansible noarch 2.5.5-8.kb1.ky3_4
ansible-help noarch 2.5.5-8.kb1.ky3_4

V6

软件名称 架构 版本号
ansible noarch 2.9.27-7.ks6
ansible-doc noarch 2.9.27-7.ks6
ansible-test noarch 2.9.27-7.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     ansible   

     ansible-help   

aarch64:

     ansible   

     ansible-help   

V6:

x86_64:

     ansible   

     ansible-doc   

     ansible-test   

aarch64:

     ansible   

     ansible-doc   

     ansible-test   

上一篇:KylinSec-SA-2025-1629 下一篇:KylinSec-SA-2025-1631