{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: template Injection Vulnerability\n     - debian/patches/CVE-2021-3583.patch: fix unsafe preservation across\n       newlines to ensure always having unsafe\n     - CVE-2021-3583",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2025/clsa-2025_1748451788.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1748451788",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1748451788"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-28T17:37:36Z",
      "generator": {
        "date": "2025-05-28T17:37:36Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1748451788",
      "initial_release_date": "2025-05-28T17:37:36Z",
      "revision_history": [
        {
          "date": "2025-05-28T17:37:36Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2021-3583"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all",
                "product": {
                  "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all",
                  "product_id": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/ansible@2.1.1.0-1~ubuntu16.04.1%2Btuxcare.els11?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
        },
        "product_reference": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-3583",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3583"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1968412",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968412"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
        }
      ],
      "release_date": "2021-09-22T12:15:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL_ACCESS",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2020-1733",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 && mkdir -p <dir>\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-1733"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733"
        },
        {
          "category": "external",
          "summary": "https://github.com/ansible/ansible/issues/67791",
          "url": "https://github.com/ansible/ansible/issues/67791"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202006-11",
          "url": "https://security.gentoo.org/glsa/202006-11"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4950",
          "url": "https://www.debian.org/security/2021/dsa-4950"
        }
      ],
      "release_date": "2020-03-11T19:15:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL_ACCESS",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2018-10875",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2018-10875"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
        },
        {
          "category": "external",
          "summary": "http://www.securitytracker.com/id/1041396",
          "url": "http://www.securitytracker.com/id/1041396"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHBA-2018:3788",
          "url": "https://access.redhat.com/errata/RHBA-2018:3788"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2150",
          "url": "https://access.redhat.com/errata/RHSA-2018:2150"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2151",
          "url": "https://access.redhat.com/errata/RHSA-2018:2151"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2152",
          "url": "https://access.redhat.com/errata/RHSA-2018:2152"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2166",
          "url": "https://access.redhat.com/errata/RHSA-2018:2166"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2321",
          "url": "https://access.redhat.com/errata/RHSA-2018:2321"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2018:2585",
          "url": "https://access.redhat.com/errata/RHSA-2018:2585"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:0054",
          "url": "https://access.redhat.com/errata/RHSA-2019:0054"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10875",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10875"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4072-1/",
          "url": "https://usn.ubuntu.com/4072-1/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4396",
          "url": "https://www.debian.org/security/2019/dsa-4396"
        }
      ],
      "release_date": "2018-07-13T22:29:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL_ACCESS",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2020-10744",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "notes": [
        {
          "category": "description",
          "text": "An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-10744"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744"
        }
      ],
      "release_date": "2020-05-15T14:15:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL_ACCESS",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els11.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    }
  ]
}