Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
base: f98af3b8db0f
Choose a base ref
...
head repository: NixOS/nixpkgs
compare: 05c6009f5640
Choose a head ref
  • 4 commits
  • 2 files changed
  • 2 contributors

Commits on Dec 15, 2019

  1. ansible_2_7: 2.7.11 -> 2.7.15

    This fixes the following security issues:
      * Ansible: Splunk and Sumologic callback plugins leak sensitive data
        in logs (CVE-2019-14864)
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when invalid
        parameters are passed to the module (CVE-2019-14858)
      * resolves CVE-2019-10206, by avoiding templating passwords from
        prompt as it is probable they have special characters.
      * Handle improper variable substitution that was happening in
        safe_eval, it was always meant to just do 'type enforcement' and have
        Jinja2 deal with all variable interpolation. Also see CVE-2019-10156
    
    Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
    andir committed Dec 15, 2019
    Copy the full SHA
    64e2791 View commit details
    Browse the repository at this point in the history
  2. ansible_2_8: 2.8.4 -> 2.8.7

    This addresses the following security issues:
    
      * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when
        invalid parameters are passed to the module (CVE-2019-14858)
    
    Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst
    andir committed Dec 15, 2019
    Copy the full SHA
    71cde97 View commit details
    Browse the repository at this point in the history
  3. ansible_2_6: 2.6.17 -> 2.6.20

    This addresses the following security issues:
    
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when
        invalid parameters are passed to the module (CVE-2019-14858)
      * resolves CVE-2019-10206, by avoiding templating passwords from
        prompt as it is probable they have special characters.
      * Handle improper variable substitution that was happening in
        safe_eval, it was always meant to just do 'type enforcement' and have
        Jinja2 deal with all variable interpolation. Also see CVE-2019-10156
    
    Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
    andir committed Dec 15, 2019
    Copy the full SHA
    b21b929 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    05c6009 View commit details
    Browse the repository at this point in the history