As of today, upstream has not fixed this yet, as the proposed patch
breaks other code.

IMHO this is a no-DSA bug which we can fix when upstream fixes it,
because the following conditions need to be met:

- The user has configured umask 000 for the ansible user on the target
  (which is not default on Debian)
- the ansible task creating the file does not define file permissions

In this case the file is created with 0666 permissions, which I'd call
"expected behaviour", just as "umask 000; touch myfile" will create a
world-readable file. Simple workarounds are either defining a sane
umask, or setting the permissions explicitely, which is recommended anyway.

On Sat, 01 Aug 2020 13:44:43 +0200 Salvatore Bonaccorso
<car...@debian.org> wrote:
> Source: ansible
> Version: 2.9.9+dfsg-1
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/ansible/ansible/issues/67794
> X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for ansible.
> 
> CVE-2020-1736[0]:
> | A flaw was found in Ansible Engine when a file is moved using
> | atomic_move primitive as the file mode cannot be specified. This sets
> | the destination files world-readable if the destination file does not
> | exist and if the file exists, the file could be changed to have less
> | restrictive permissions before the move. This could lead to the
> | disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x
> | branches are believed to be vulnerable.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2020-1736
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1736
> [1] https://github.com/ansible/ansible/issues/67794
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Regards,
> Salvatore
> 
> 

Reply via email to