Name | CVE-2016-8628 |
Description | Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 842985 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ansible (PTS) | jessie, jessie (lts) | 1.7.2+dfsg-2+deb8u3 | fixed |
| stretch (security), stretch (lts), stretch | 2.2.1.0-2+deb9u3 | fixed |
| buster (security), buster, buster (lts) | 2.7.7+dfsg-1+deb10u2 | fixed |
| bullseye | 2.10.7+merged+base+2.10.17+dfsg-0+deb11u1 | fixed |
| bookworm | 7.7.0+dfsg-3+deb12u1 | fixed |
| sid, trixie | 10.5.0+dfsg-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
ansible | source | jessie | (not affected) | | | |
ansible | source | (unstable) | 2.2.0.0-1 | | | 842985 |
Notes
[jessie] - ansible <not-affected> (Vulnerable code not present)
Fixed upstream in v2.2.0.0-1
Needs an attacker to compromise a controlled server.