CVE-2016-3096

The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1322925 Issue Tracking
https://github.com/ansible/ansible-modules-extras/pull/1941 Patch
https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4 Patch
https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd Third Party Advisory
https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away Patch
https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0
https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig
https://security.gentoo.org/glsa/201607-14 Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183103.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183132.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183252.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183274.html Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184175.html Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1322925 Issue Tracking
https://github.com/ansible/ansible-modules-extras/pull/1941 Patch
https://github.com/ansible/ansible-modules-extras/pull/1941/commits/8c6fe646ee79f5e55361b885b7efed5bec72d4a4 Patch
https://github.com/ansible/ansible/blob/v1.9.6-1/CHANGELOG.md#196-dancing-in-the-street---tbd Third Party Advisory
https://github.com/ansible/ansible/blob/v2.0.2.0-1/CHANGELOG.md#202-over-the-hills-and-far-away Patch
https://groups.google.com/forum/#%21topic/ansible-announce/E80HLZilTU0
https://groups.google.com/forum/#%21topic/ansible-announce/tqiZbcWxYig
https://security.gentoo.org/glsa/201607-14 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible:2.0.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-06-03 14:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-3096

Mitre link : CVE-2016-3096

CVE.ORG link : CVE-2016-3096


JSON object : View

Products Affected

redhat

  • ansible

fedoraproject

  • fedora
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')