Bug 973546 (CVE-2016-3096) - VUL-0: CVE-2016-3096: ansible: Code execution vulnerability in ansible lxc_container
Summary: VUL-0: CVE-2016-3096: ansible: Code execution vulnerability in ansible lxc_co...
Status: RESOLVED INVALID
Alias: CVE-2016-3096
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 42.1
: P3 - Medium : Major
Target Milestone: ---
Assignee: Lars Vogdt
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/165408/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-04-01 07:36 UTC by Johannes Segitz
Modified: 2017-12-02 03:19 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2016-04-01 07:36:40 UTC
rh#1322925

A vulnerability in lxc_container, ansible module, was found allowing to get root inside the container. The problem is in the create_script function, which tries to write to /opt/.lxc-attach-script inside of the container. If the attacker can write to /opt/.lxc-attach-script before that, he can overwrite arbitrary files or execute commands as root.

Simple fix would be using "tempfile.mkdtemp()" instead of "/opt".

Acknowledgments: Evgeni Golov (Red Hat)

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1322925
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3096
Comment 1 Swamp Workflow Management 2016-04-01 22:00:17 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2016-11-18 12:55:38 UTC
IBS versions are > 2.1, only openSUSE might still be affected
Comment 3 Lars Vogdt 2017-12-02 03:19:39 UTC
openSUSE 42.2 & 42.3 as well as openSUSE:Backports have ansible 2.4.1, which is not affected. Closing here.