Debian Package Tracker
Register | Log in
Subscribe

ansible

Configuration management, deployment, and task execution system

Choose email to subscribe with

general
  • source: ansible (main)
  • version: 7.3.0+dfsg-1
  • maintainer: Lee Garrett (DMD)
  • uploaders: Harlan Lieberman-Berg [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.2.1.0-2+deb9u1
  • o-o-sec: 2.2.1.0-2+deb9u3
  • o-o-bpo: 2.7.5+dfsg-1~bpo9+1
  • oldstable: 2.7.7+dfsg-1+deb10u1
  • old-sec: 2.7.7+dfsg-1+deb10u1
  • old-bpo: 2.9.16+dfsg-1~bpo10+2
  • stable: 2.10.7+merged+base+2.10.8+dfsg-1
  • testing: 7.3.0+dfsg-1
  • unstable: 7.3.0+dfsg-1
versioned links
  • 2.2.1.0-2+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.2.1.0-2+deb9u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.5+dfsg-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.7+dfsg-1+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.9.16+dfsg-1~bpo10+2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.10.7+merged+base+2.10.8+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.3.0+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • ansible (6 bugs: 0, 5, 1, 0)
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:04:04
    Last run: 2023-03-03T10:34:20.000Z
    Previous status: pass

  • testing: pass (log)
    The tests ran in 0:04:30
    Last run: 2023-03-14T17:22:18.000Z
    Previous status: pass

  • stable: fail (log)
    The tests ran in 0:02:45
    Last run: 2023-03-23T01:19:51.000Z
    Previous status: fail

Created: 2021-05-09 Last update: 2023-03-23 18:09
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2021-3447: A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
  • CVE-2021-3532: A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
  • CVE-2021-3533: A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
Created: 2022-07-04 Last update: 2023-03-12 07:00
9 low-priority security issues in bullseye low

There are 9 open security issues in bullseye.

9 issues left for the package maintainer to handle:
  • CVE-2021-3447: (needs triaging) A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
  • CVE-2021-3532: (postponed; to be fixed through a stable update) A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
  • CVE-2021-3533: (postponed; to be fixed through a stable update) A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
  • CVE-2021-3583: (needs triaging) A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
  • CVE-2021-3620: (postponed; to be fixed through a stable update) A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
  • CVE-2022-3697: (needs triaging) A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
  • CVE-2021-20178: (needs triaging) A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
  • CVE-2021-20180: (needs triaging) A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
  • CVE-2021-20191: (needs triaging) A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2023-03-12 07:00
news
[rss feed]
  • [2023-03-12] ansible 7.3.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2023-03-02] Accepted ansible 7.3.0+dfsg-1 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2023-02-12] ansible 7.2.0+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-09] Accepted ansible 7.2.0+dfsg-2 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-12-16] ansible 7.1.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-13] Accepted ansible 7.1.0+dfsg-1 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-12-09] ansible 7.0.0+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2022-12-06] Accepted ansible 7.0.0+dfsg-2 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-12-03] ansible 7.0.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-30] Accepted ansible 7.0.0+dfsg-1 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-09-21] ansible 6.4.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-15] Accepted ansible 6.4.0+dfsg-1 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-09-15] ansible 6.3.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-09] Accepted ansible 6.3.0+dfsg-1 (source) into unstable (Lee Garrett) (signed by: Mark Lee Garrett)
  • [2022-03-27] ansible 5.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-21] Accepted ansible 5.5.0-1 (source) into unstable (Lee Garrett)
  • [2022-03-12] ansible 5.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-06] Accepted ansible 5.4.0-1 (source) into unstable (Lee Garrett)
  • [2022-02-04] Accepted ansible 2.2.1.0-2+deb9u3 (source) into oldoldstable (Lee Garrett)
  • [2021-09-30] Accepted ansible 4.6.0-1 (source) into experimental (Lee Garrett)
  • [2021-08-07] Accepted ansible 2.7.7+dfsg-1+deb10u1 (source all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2021-08-07] Accepted ansible 2.7.7+dfsg-1+deb10u1 (source all) into stable->embargoed, stable (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2021-05-09] ansible 2.10.7+merged+base+2.10.8+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2021-04-19] Accepted ansible 2.10.7+merged+base+2.10.8+dfsg-1 (source) into unstable (Lee Garrett)
  • [2021-04-01] Accepted ansible 2.9.16+dfsg-1~bpo10+2 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Pierre-Elliott Bécue)
  • [2021-03-25] Accepted ansible 2.10.7-2 (source) into experimental (Lee Garrett)
  • [2021-03-17] Accepted ansible 2.9.16+dfsg-1~bpo10+1 (source) into buster-backports->backports-policy, buster-backports (Debian FTP Masters) (signed by: Pierre-Elliott Bécue)
  • [2021-02-10] Accepted ansible 2.10.7-1 (source) into unstable (Lee Garrett)
  • [2021-01-27] Accepted ansible 2.2.1.0-2+deb9u2 (source) into oldstable (Markus Koschany)
  • [2021-01-13] ansible 2.9.16+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 13
  • RC: 0
  • I&N: 12
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 7.2.0+dfsg-2
  • 15 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing