Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-3096

Published: 3 June 2016

The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.

Priority

Medium

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
ansible
Launchpad, Ubuntu, Debian
artful Not vulnerable
(2.0.2.0-1)
bionic Not vulnerable
(2.0.2.0-1)
cosmic Not vulnerable
(2.0.2.0-1)
disco Not vulnerable
(2.0.2.0-1)
precise Does not exist

trusty Not vulnerable
(code not present)
upstream
Released (2.0.1.0-2)
wily Ignored
(end of life)
xenial
Released (2.0.0.2-2ubuntu1.3)
yakkety Not vulnerable
(2.0.2.0-1)
zesty Not vulnerable
(2.0.2.0-1)
Patches:
upstream: https://github.com/ansible/ansible-modules-extras/commit/7c3999a92a1cd856ff9bc8913a93ff1aee8bffc3

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H