{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu18.04els/vex/2020/cve-2020-1733-els_os-ubuntu18_04els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-24T10:56:21Z",
      "generator": {
        "date": "2026-04-24T10:56:21Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2020-1733-ELS_OS-UBUNTU18.04ELS",
      "initial_release_date": "2020-03-11T19:15:00Z",
      "revision_history": [
        {
          "date": "2020-03-11T19:15:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-10T19:43:42Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2026-04-24T10:56:21Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    },
    "title": "Security update on CVE-2020-1733"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 18.04",
                "product": {
                  "name": "Ubuntu 18.04",
                  "product_id": "Ubuntu-18",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1.all",
                "product": {
                  "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1.all",
                  "product_id": "ansible-0:2.5.1+dfsg-1ubuntu0.1.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/ubuntu/ansible@2.5.1%2Bdfsg-1ubuntu0.1?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
                "product": {
                  "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
                  "product_id": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/ansible@2.5.1%2Bdfsg-1ubuntu0.1%2Btuxcare.els6?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
                "product": {
                  "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
                  "product_id": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/ansible@2.5.1%2Bdfsg-1ubuntu0.1%2Btuxcare.els1?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
                "product": {
                  "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
                  "product_id": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/ansible@2.5.1%2Bdfsg-1ubuntu0.1%2Btuxcare.els2?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
                "product": {
                  "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
                  "product_id": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/ansible@2.5.1%2Bdfsg-1ubuntu0.1%2Btuxcare.els7?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all"
        },
        "product_reference": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all"
        },
        "product_reference": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all"
        },
        "product_reference": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all"
        },
        "product_reference": "ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.5.1+dfsg-1ubuntu0.1.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1.all"
        },
        "product_reference": "ansible-0:2.5.1+dfsg-1ubuntu0.1.all",
        "relates_to_product_reference": "Ubuntu-18"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-1733",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 && mkdir -p <dir>\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
          "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
          "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
          "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
          "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-1733"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733"
        },
        {
          "category": "external",
          "summary": "https://github.com/ansible/ansible/issues/67791",
          "url": "https://github.com/ansible/ansible/issues/67791"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202006-11",
          "url": "https://security.gentoo.org/glsa/202006-11"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4950",
          "url": "https://www.debian.org/security/2021/dsa-4950"
        }
      ],
      "release_date": "2020-03-11T19:15:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "CVE-2020-1733 is a local-only race that can be triggered only while a playbook is actively running with become_user explicitly set to a non-root account; the attacker must pre-create the module’s temporary directory in /var/tmp and win a timing race during execution. Even if successful, the attacker gains only the privileges of that unprivileged become_user (not root), and the vector requires user interaction and high complexity with limited confidentiality, integrity, and availability impact. Because this hinges on a non-default configuration (the default become_user is root) and on local presence during execution, it presents low practical risk in managed server/VM environments and can be deprioritized.",
          "product_ids": [
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1.all"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els1.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els2.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els6.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1+tuxcare.els7.all",
            "Ubuntu-18:ansible-0:2.5.1+dfsg-1ubuntu0.1.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}