[Git][security-tracker-team/security-tracker][master] Add note about CVE-2020-1736 that is considered a documentatio issue upstream

Bastien Roucariès (@rouca) rouca at debian.org
Sun Dec 17 13:42:45 GMT 2023



Bastien Roucariès pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0f49abef by Bastien Roucariès at 2023-12-17T13:41:52+00:00
Add note about CVE-2020-1736 that is considered a documentatio issue upstream

According to upstream:
Specifying mode is the best way to ensure files are created with the correct permissions. See CVE-2020-1736 for further details

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -292831,11 +292831,13 @@ CVE-2020-1737 (A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, an
 CVE-2020-1736 (A flaw was found in Ansible Engine when a file is moved using atomic_m ...)
 	- ansible <unfixed> (unimportant; bug #966663)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1802124
-	NOTE: https://github.com/ansible/ansible/issues/67794
-	NOTE: https://github.com/ansible/ansible/pull/70221
+	NOTE: https://github.com/ansible/ansible/issues/67794 (closed upstream)
+	NOTE: https://github.com/ansible/ansible/pull/70221 (not merged)
 	NOTE: The issue will not be fixed source-wise, but to avoid the issue raised in
 	NOTE: CVE-2020-1736 one should specify a mode parameter in all file-based tasks
 	NOTE: that accept it, cf. https://github.com/ansible/ansible/commit/7eec8e4d268d6711f317583974e9e936083de636
+	NOTE: That just leaves a race condition in place where newly created files that specify a mode in the task briefly go from (666 - umask) to the final mode. An alternative workaround if many new files are ansible.builtin.copy mode=preserve that preserve file mode from controller to managed host.
+	NOTE: Upstream consider this a documentation issue and fix it by adding comment "Specifying mode is the best way to ensure files are created with the correct permissions. See CVE-2020-1736 for further details." to dangerous command.
 CVE-2020-1735 (A flaw was found in the Ansible Engine when the fetch module is used.  ...)
 	{DSA-4950-1}
 	- ansible 2.9.7+dfsg-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f49abefdf13eb615d221bb7f50aadd6f3bfcf31

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f49abefdf13eb615d221bb7f50aadd6f3bfcf31
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231217/254a34c9/attachment.htm>


More information about the debian-security-tracker-commits mailing list