Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-3828 (GCVE-0-2019-3828)
Vulnerability from cvelistv5 – Published: 2019-03-27 00:00 – Updated: 2024-08-04 19:19
VLAI?
EPSS
Summary
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
Severity ?
4.2 (Medium)
CWE
Assigner
References
9 references
| URL | Tags |
|---|---|
| https://github.com/ansible/ansible/pull/52133 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2… | |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisory |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisory |
| https://usn.ubuntu.com/4072-1/ | vendor-advisory |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisory |
| https://access.redhat.com/errata/RHSA-2019:3744 | vendor-advisory |
| https://access.redhat.com/errata/RHSA-2019:3789 | vendor-advisory |
| http://packetstormsecurity.com/files/172837/Ansib… |
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:19:18.580Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"name": "openSUSE-SU-2019:1125",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"name": "openSUSE-SU-2019:1635",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"name": "USN-4072-1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4072-1/"
},
{
"name": "openSUSE-SU-2019:1858",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"name": "RHSA-2019:3744",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ansible",
"vendor": "Red Hat",
"versions": [
{
"status": "affected",
"version": "2.5.15"
},
{
"status": "affected",
"version": "2.6.14"
},
{
"status": "affected",
"version": "2.7.8"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-12T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"name": "openSUSE-SU-2019:1125",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"name": "openSUSE-SU-2019:1635",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"name": "USN-4072-1",
"tags": [
"vendor-advisory"
],
"url": "https://usn.ubuntu.com/4072-1/"
},
{
"name": "openSUSE-SU-2019:1858",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"name": "RHSA-2019:3744",
"tags": [
"vendor-advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"tags": [
"vendor-advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2019-3828",
"datePublished": "2019-03-27T00:00:00.000Z",
"dateReserved": "2019-01-03T00:00:00.000Z",
"dateUpdated": "2024-08-04T19:19:18.580Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-3828",
"date": "2026-05-24",
"epss": "0.0003",
"percentile": "0.08864"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.5.0\", \"versionEndExcluding\": \"2.5.15\", \"matchCriteriaId\": \"4D00678C-9643-485D-9B89-86B7C6C7271C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.6.0\", \"versionEndExcluding\": \"2.6.14\", \"matchCriteriaId\": \"306F9CF3-3321-47FE-8F7E-0D8A4FE9E946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.7.0\", \"versionEndExcluding\": \"2.7.8\", \"matchCriteriaId\": \"20692032-5F40-4107-8897-C3C46B8B98C3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.\"}, {\"lang\": \"es\", \"value\": \"El m\\u00f3dulo fetch de Ansible, en versiones anteriores a las 2.5.15, 2.6.14 y 2.7.8, tiene una vulnerabilidad de salto de directorio que permite la copia y la sobrescritura de archivos fuera de la carpeta especificada en el host del controlador local de Ansible mediante la no restricci\\u00f3n de una ruta absoluta.\"}]",
"id": "CVE-2019-3828",
"lastModified": "2024-11-21T04:42:37.820",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.2, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.1, \"impactScore\": 2.7}], \"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.2, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.1, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 3.3, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-03-27T13:29:01.617",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3744\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3789\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ansible/ansible/pull/52133\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4072-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3744\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:3789\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/ansible/ansible/pull/52133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4072-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-3828\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-03-27T13:29:01.617\",\"lastModified\":\"2024-11-21T04:42:37.820\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo fetch de Ansible, en versiones anteriores a las 2.5.15, 2.6.14 y 2.7.8, tiene una vulnerabilidad de salto de directorio que permite la copia y la sobrescritura de archivos fuera de la carpeta especificada en el host del controlador local de Ansible mediante la no restricci\u00f3n de una ruta absoluta.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.5.0\",\"versionEndExcluding\":\"2.5.15\",\"matchCriteriaId\":\"4D00678C-9643-485D-9B89-86B7C6C7271C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndExcluding\":\"2.6.14\",\"matchCriteriaId\":\"306F9CF3-3321-47FE-8F7E-0D8A4FE9E946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.8\",\"matchCriteriaId\":\"20692032-5F40-4107-8897-C3C46B8B98C3\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3744\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3789\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ansible/ansible/pull/52133\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4072-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ansible/ansible/pull/52133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4072-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
BDU:2019-01543
Vulnerability from fstec - Published: 12.02.2019
VLAI Severity ?
Title
Уязвимость модуля fetch системы управления конфигурациями Ansible, связанная c неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
Description
Уязвимость модуля fetch системы управления конфигурациями Ansible связана c неверным ограничением имени пути к каталогу с ограниченным доступом. Эксплуатация уязвимости может позволить нарушителю, действующему локально, получить несанкционированный доступ к информации и нарушить ее целостность путем копирования и перезаписи файлов, находящихся за пределами заданного каталога
Severity ?
Vendor
Canonical Ltd., Сообщество свободного программного обеспечения, Novell Inc., ООО «РусБИТех-Астра», Red Hat Inc., АО "НППКТ"
Software Name
Ubuntu, Debian GNU/Linux, OpenSUSE Leap, Astra Linux Special Edition (запись в едином реестре российских программ №369), Ansible, SUSE Package Hub for SUSE Linux Enterprise, Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 18.04 LTS (Ubuntu), 1.6 «Смоленск» (Astra Linux Special Edition), 19.04 (Ubuntu), от 2.5.0 до 2.5.14 включительно (Ansible), от 2.6.0 до 2.6.13 включительно (Ansible), от 2.7.0 до 2.7.7 включительно (Ansible), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 8 (Debian GNU/Linux), 12 (SUSE Package Hub for SUSE Linux Enterprise), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), до 2.8 (ОСОН ОСнова Оnyx)
Possible Mitigations
Использование рекомендаций:
Для Ansible:
Обновление программного обеспечения до 2.7.8 или более поздней версии
Для Debian:
Обновление программного обеспечения (пакета ansible) до 2.2.1.0-2+deb9u1 или более поздней версии
Для Astra Linux:
Обновление программного обеспечения (пакета ansible) до 2.2.1.0-2+deb9u1 или более поздней версии
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2019-3828/
Для Ubuntu:
https://usn.ubuntu.com/4072-1/
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения ansible до версии 2.10.7+merged+base+2.10.8+dfsg-1
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1676689
https://github.com/ansible/ansible/pull/52133
https://nvd.nist.gov/vuln/detail/CVE-2019-3828
https://security-tracker.debian.org/tracker/CVE-2019-3828
https://www.suse.com/security/cve/CVE-2019-3828/
https://usn.ubuntu.com/4072-1/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20200429SE81
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.8/
CWE
CWE-22
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 19.04 (Ubuntu), \u043e\u0442 2.5.0 \u0434\u043e 2.5.14 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Ansible), \u043e\u0442 2.6.0 \u0434\u043e 2.6.13 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Ansible), \u043e\u0442 2.7.0 \u0434\u043e 2.7.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Ansible), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 8 (Debian GNU/Linux), 12 (SUSE Package Hub for SUSE Linux Enterprise), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), \u0434\u043e 2.8 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Ansible:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 2.7.8 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\n\n\u0414\u043b\u044f Debian:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 ansible) \u0434\u043e 2.2.1.0-2+deb9u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Astra Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 ansible) \u0434\u043e 2.2.1.0-2+deb9u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2019-3828/\n\n\u0414\u043b\u044f Ubuntu:\nhttps://usn.ubuntu.com/4072-1/\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f ansible \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.10.7+merged+base+2.10.8+dfsg-1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.02.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.09.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01543",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-3828",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Debian GNU/Linux, OpenSUSE Leap, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Ansible, SUSE Package Hub for SUSE Linux Enterprise, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Novell Inc. OpenSUSE Leap 42.3 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Canonical Ltd. Ubuntu 19.04 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f fetch \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 Ansible, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f c \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (\u00ab\u041e\u0431\u0445\u043e\u0434 \u043f\u0443\u0442\u0438\u00bb) (CWE-22)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f fetch \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 Ansible \u0441\u0432\u044f\u0437\u0430\u043d\u0430 c \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u043f\u0443\u0442\u0435\u043c \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u043e\u0432, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u0445\u0441\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0437\u0430\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://bugzilla.redhat.com/show_bug.cgi?id=1676689\n\nhttps://github.com/ansible/ansible/pull/52133\n\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3828\n\nhttps://security-tracker.debian.org/tracker/CVE-2019-3828\nhttps://www.suse.com/security/cve/CVE-2019-3828/\nhttps://usn.ubuntu.com/4072-1/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20200429SE81\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.8/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-22",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,2)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,6)"
}
CNVD-2019-05438
Vulnerability from cnvd - Published: 2019-03-05
VLAI Severity ?
Title
Ansible fetch module路径遍历漏洞
Description
Ansible是一款计算机系统配置管理器,它可用于发布、管理和编排计算机系统。
Ansible fetch module中存在路径遍历漏洞。攻击者可利用该漏洞复制并覆盖文件。
Severity
低
Formal description
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://www.ansible.com/
Reference
https://access.redhat.com/security/cve/cve-2019-3828
Impacted products
| Name | Red Hat Ansible |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-3828"
}
},
"description": "Ansible\u662f\u4e00\u6b3e\u8ba1\u7b97\u673a\u7cfb\u7edf\u914d\u7f6e\u7ba1\u7406\u5668\uff0c\u5b83\u53ef\u7528\u4e8e\u53d1\u5e03\u3001\u7ba1\u7406\u548c\u7f16\u6392\u8ba1\u7b97\u673a\u7cfb\u7edf\u3002\n\nAnsible fetch module\u4e2d\u5b58\u5728\u8def\u5f84\u904d\u5386\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u590d\u5236\u5e76\u8986\u76d6\u6587\u4ef6\u3002",
"discovererName": "unknwon",
"formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a\r\nhttps://www.ansible.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-05438",
"openTime": "2019-03-05",
"products": {
"product": "Red Hat Ansible"
},
"referenceLink": "https://access.redhat.com/security/cve/cve-2019-3828",
"serverity": "\u4f4e",
"submitTime": "2019-02-26",
"title": "Ansible fetch module\u8def\u5f84\u904d\u5386\u6f0f\u6d1e"
}
FKIE_CVE-2019-3828
Vulnerability from fkie_nvd - Published: 2019-03-27 13:29 - Updated: 2024-11-21 04:42
Severity ?
Summary
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D00678C-9643-485D-9B89-86B7C6C7271C",
"versionEndExcluding": "2.5.15",
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"matchCriteriaId": "306F9CF3-3321-47FE-8F7E-0D8A4FE9E946",
"versionEndExcluding": "2.6.14",
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20692032-5F40-4107-8897-C3C46B8B98C3",
"versionEndExcluding": "2.7.8",
"versionStartIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path."
},
{
"lang": "es",
"value": "El m\u00f3dulo fetch de Ansible, en versiones anteriores a las 2.5.15, 2.6.14 y 2.7.8, tiene una vulnerabilidad de salto de directorio que permite la copia y la sobrescritura de archivos fuera de la carpeta especificada en el host del controlador local de Ansible mediante la no restricci\u00f3n de una ruta absoluta."
}
],
"id": "CVE-2019-3828",
"lastModified": "2024-11-21T04:42:37.820",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7,
"source": "secalert@redhat.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-27T13:29:01.617",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"source": "secalert@redhat.com",
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4072-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4072-1/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-74VQ-H4Q8-X6JV
Vulnerability from github – Published: 2019-04-15 16:19 – Updated: 2024-11-18 16:26
VLAI?
Summary
Ansible Path Traversal vulnerability
Details
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "ansible"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.15"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "ansible"
},
"ranges": [
{
"events": [
{
"introduced": "2.6.0a1"
},
{
"fixed": "2.6.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "ansible"
},
"ranges": [
{
"events": [
{
"introduced": "2.7.0a1"
},
{
"fixed": "2.7.8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2019-3828"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:21:22Z",
"nvd_published_at": "2019-03-27T13:29:01Z",
"severity": "LOW"
},
"details": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"id": "GHSA-74vq-h4q8-x6jv",
"modified": "2024-11-18T16:26:06Z",
"published": "2019-04-15T16:19:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3828"
},
{
"type": "WEB",
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"type": "WEB",
"url": "https://github.com/ansible/ansible/commit/396a2f74717477d80600450e2b7e45349d7b5110"
},
{
"type": "WEB",
"url": "https://github.com/ansible/ansible/commit/4be3215d2f9f84ca283895879f0c6ce1ed7dd333"
},
{
"type": "WEB",
"url": "https://github.com/ansible/ansible/commit/f3edc091523fbe301926b7a0db25fbbd96940d93"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-74vq-h4q8-x6jv"
},
{
"type": "PACKAGE",
"url": "https://github.com/ansible/ansible"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2019-5.yaml"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4072-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Ansible Path Traversal vulnerability"
}
GSD-2019-3828
Vulnerability from gsd - Updated: 2023-12-13 01:24Details
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-3828",
"description": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"id": "GSD-2019-3828",
"references": [
"https://www.suse.com/security/cve/CVE-2019-3828.html",
"https://www.debian.org/security/2019/dsa-4396",
"https://access.redhat.com/errata/RHSA-2019:3789",
"https://access.redhat.com/errata/RHSA-2019:3744",
"https://access.redhat.com/errata/RHSA-2019:0433",
"https://access.redhat.com/errata/RHSA-2019:0432",
"https://access.redhat.com/errata/RHSA-2019:0431",
"https://access.redhat.com/errata/RHSA-2019:0430",
"https://ubuntu.com/security/CVE-2019-3828",
"https://advisories.mageia.org/CVE-2019-3828.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-3828"
],
"details": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"id": "GSD-2019-3828",
"modified": "2023-12-13T01:24:03.550366Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3828",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ansible",
"version": {
"version_data": [
{
"version_value": "2.5.15"
},
{
"version_value": "2.6.14"
},
{
"version_value": "2.7.8"
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ansible/ansible/pull/52133",
"refsource": "MISC",
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"name": "openSUSE-SU-2019:1125",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"name": "openSUSE-SU-2019:1635",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"name": "USN-4072-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4072-1/"
},
{
"name": "openSUSE-SU-2019:1858",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"name": "RHSA-2019:3744",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"name": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=2.5.0,\u003c2.5.15||\u003e=2.6.0,\u003c2.6.14||\u003e=2.7.0,\u003c2.7.8",
"affected_versions": "All versions starting from 2.5.0 before 2.5.15, all versions starting from 2.6.0 before 2.6.14, all versions starting from 2.7.0 before 2.7.8",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-22",
"CWE-937"
],
"date": "2019-04-03",
"description": "Ansible fetch module has a path traversal vulnerability which allows copying and overwriting files outside the specified destination in the local ansible controller host, by not restricting an absolute path.",
"fixed_versions": [
"2.5.15",
"2.6.14",
"2.7.8"
],
"identifier": "CVE-2019-3828",
"identifiers": [
"CVE-2019-3828"
],
"not_impacted": "All versions before 2.5.0, all versions starting from 2.5.15 before 2.6.0, all versions starting from 2.6.14 before 2.7.0, all versions starting from 2.7.8",
"package_slug": "pypi/ansible",
"pubdate": "2019-03-27",
"solution": "Upgrade to versions 2.5.15, 2.6.14, 2.7.8 or above.",
"title": "Path Traversal",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-3828",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
],
"uuid": "8601eb86-32e7-46b0-935d-78696ff0e226"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6.14",
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.7.8",
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.5.15",
"versionStartIncluding": "2.5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3828"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/ansible/ansible/pull/52133",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ansible/ansible/pull/52133"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3828"
},
{
"name": "openSUSE-SU-2019:1125",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"name": "openSUSE-SU-2019:1635",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html"
},
{
"name": "USN-4072-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4072-1/"
},
{
"name": "openSUSE-SU-2019:1858",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html"
},
{
"name": "RHSA-2019:3744",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3744"
},
{
"name": "RHSA-2019:3789",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3789"
},
{
"name": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7
}
},
"lastModifiedDate": "2023-06-12T07:15Z",
"publishedDate": "2019-03-27T13:29Z"
}
}
}
OPENSUSE-SU-2019:1125-1
Vulnerability from csaf_opensuse - Published: 2019-04-03 01:50 - Updated: 2019-04-03 01:50Summary
Security update for ansible
Severity
Moderate
Notes
Title of the patch: Security update for ansible
Description of the patch: This update for ansible to version 2.7.8 fixes the following issues:
Security issues fixed:
- CVE-2018-16837: Fixed an information leak in user module (bsc#1112959).
- CVE-2018-16859: Fixed an issue which clould allow logging of password in plaintext in Windows powerShell (bsc#1116587).
- CVE-2019-3828: Fixed a path traversal vulnerability in fetch module (bsc#1126503).
- CVE-2018-10875: Fixed a potential code execution in ansible.cfg (bsc#1099808).
- CVE-2018-16876: Fixed an issue which could allow information disclosure in vvv+ mode with no_log on (bsc#1118896).
Other issues addressed:
- prepare update to 2.7.8 for multiple releases (boo#1102126, boo#1109957)
Release notes: https://github.com/ansible/ansible/blob/stable-2.7/changelogs/CHANGELOG-v2.7.rst#id1
Patchnames: openSUSE-2019-1125
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
Threats
Impact
low
4.2 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
References
30 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ansible",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ansible to version 2.7.8 fixes the following issues:\n\nSecurity issues fixed: \t \n\n- CVE-2018-16837: Fixed an information leak in user module (bsc#1112959).\n- CVE-2018-16859: Fixed an issue which clould allow logging of password in plaintext in Windows powerShell (bsc#1116587).\n- CVE-2019-3828: Fixed a path traversal vulnerability in fetch module (bsc#1126503).\n- CVE-2018-10875: Fixed a potential code execution in ansible.cfg (bsc#1099808).\n- CVE-2018-16876: Fixed an issue which could allow information disclosure in vvv+ mode with no_log on (bsc#1118896).\n\nOther issues addressed: \n\n- prepare update to 2.7.8 for multiple releases (boo#1102126, boo#1109957)\n\nRelease notes: https://github.com/ansible/ansible/blob/stable-2.7/changelogs/CHANGELOG-v2.7.rst#id1\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1125",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1125-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1125-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW/#P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1125-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW/#P7ES2KO7RTXEO4IZY7YGCEBV3XZND5MW"
},
{
"category": "self",
"summary": "SUSE Bug 1099808",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "self",
"summary": "SUSE Bug 1102126",
"url": "https://bugzilla.suse.com/1102126"
},
{
"category": "self",
"summary": "SUSE Bug 1109957",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "self",
"summary": "SUSE Bug 1112959",
"url": "https://bugzilla.suse.com/1112959"
},
{
"category": "self",
"summary": "SUSE Bug 1116587",
"url": "https://bugzilla.suse.com/1116587"
},
{
"category": "self",
"summary": "SUSE Bug 1118896",
"url": "https://bugzilla.suse.com/1118896"
},
{
"category": "self",
"summary": "SUSE Bug 1126503",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10875 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16837 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16859 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3828 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3828/"
}
],
"title": "Security update for ansible",
"tracking": {
"current_release_date": "2019-04-03T01:50:46Z",
"generator": {
"date": "2019-04-03T01:50:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1125-1",
"initial_release_date": "2019-04-03T01:50:46Z",
"revision_history": [
{
"date": "2019-04-03T01:50:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.7.8-bp150.3.6.1.noarch",
"product": {
"name": "ansible-2.7.8-bp150.3.6.1.noarch",
"product_id": "ansible-2.7.8-bp150.3.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.7.8-bp150.3.6.1.noarch as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch"
},
"product_reference": "ansible-2.7.8-bp150.3.6.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.7.8-bp150.3.6.1.noarch as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch"
},
"product_reference": "ansible-2.7.8-bp150.3.6.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.7.8-bp150.3.6.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
},
"product_reference": "ansible-2.7.8-bp150.3.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-10875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10875"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10875",
"url": "https://www.suse.com/security/cve/CVE-2018-10875"
},
{
"category": "external",
"summary": "SUSE Bug 1099808 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1109957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-03T01:50:46Z",
"details": "important"
}
],
"title": "CVE-2018-10875"
},
{
"cve": "CVE-2018-16837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16837"
}
],
"notes": [
{
"category": "general",
"text": "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16837",
"url": "https://www.suse.com/security/cve/CVE-2018-16837"
},
{
"category": "external",
"summary": "SUSE Bug 1112959 for CVE-2018-16837",
"url": "https://bugzilla.suse.com/1112959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-03T01:50:46Z",
"details": "important"
}
],
"title": "CVE-2018-16837"
},
{
"cve": "CVE-2018-16859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16859"
}
],
"notes": [
{
"category": "general",
"text": "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for \u0027become\u0027 passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16859",
"url": "https://www.suse.com/security/cve/CVE-2018-16859"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1116587 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1116587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-03T01:50:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-16859"
},
{
"cve": "CVE-2018-16876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16876"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16876",
"url": "https://www.suse.com/security/cve/CVE-2018-16876"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1118896 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1118896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-03T01:50:46Z",
"details": "low"
}
],
"title": "CVE-2018-16876"
},
{
"cve": "CVE-2019-3828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3828"
}
],
"notes": [
{
"category": "general",
"text": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3828",
"url": "https://www.suse.com/security/cve/CVE-2019-3828"
},
{
"category": "external",
"summary": "SUSE Bug 1126503 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.7.8-bp150.3.6.1.noarch",
"SUSE Package Hub 15:ansible-2.7.8-bp150.3.6.1.noarch",
"openSUSE Leap 15.0:ansible-2.7.8-bp150.3.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-03T01:50:46Z",
"details": "moderate"
}
],
"title": "CVE-2019-3828"
}
]
}
OPENSUSE-SU-2019:1635-1
Vulnerability from csaf_opensuse - Published: 2019-06-27 05:50 - Updated: 2019-06-27 05:50Summary
Security update for ansible
Severity
Moderate
Notes
Title of the patch: Security update for ansible
Description of the patch: This update for ansible fixes the following issues:
Ansible was updated to version 2.8.1:
Full changelog is at /usr/share/doc/packages/ansible/changelogs/
- Bugfixes
- ACI - DO not encode query_string
- ACI modules - Fix non-signature authentication
- Add missing directory provided via ``--playbook-dir`` to adjacent collection loading
- Fix 'Interface not found' errors when using eos_l2_interface with nonexistant
interfaces configured
- Fix cannot get credential when `source_auth` set to `credential_file`.
- Fix netconf_config backup string issue
- Fix privilege escalation support for the docker connection plugin when
credentials need to be supplied (e.g. sudo with password).
- Fix vyos cli prompt inspection
- Fixed loading namespaced documentation fragments from collections.
- Fixing bug came up after running cnos_vrf module against coverity.
- Properly handle data importer failures on PVC creation, instead of timing out.
- To fix the ios static route TC failure in CI
- To fix the nios member module params
- To fix the nios_zone module idempotency failure
- add terminal initial prompt for initial connection
- allow include_role to work with ansible command
- allow python_requirements_facts to report on dependencies containing dashes
- asa_config fix
- azure_rm_roledefinition - fix a small error in build scope.
- azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network
peering.
- cgroup_perf_recap - When not using file_per_task, make sure we don't
prematurely close the perf files
- display underlying error when reporting an invalid ``tasks:`` block.
- dnf - fix wildcard matching for state: absent
- docker connection plugin - accept version ``dev`` as 'newest version' and
print warning.
- docker_container - ``oom_killer`` and ``oom_score_adj`` options are available
since docker-py 1.8.0, not 2.0.0 as assumed by the version check.
- docker_container - fix network creation when ``networks_cli_compatible`` is
enabled.
- docker_container - use docker API's ``restart`` instead of ``stop``/``start``
to restart a container.
- docker_image - if ``build`` was not specified, the wrong default for
``build.rm`` is used.
- docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the
module failed.
- docker_image - module failed when ``source: build`` was set but
``build.path`` options not specified.
- docker_network module - fix idempotency when using ``aux_addresses`` in
``ipam_config``.
- ec2_instance - make Name tag idempotent
- eos: don't fail modules without become set, instead show message and continue
- eos_config: check for session support when asked to 'diff_against: session'
- eos_eapi: fix idempotency issues when vrf was unspecified.
- fix bugs for ce - more info see
- fix incorrect uses of to_native that should be to_text instead.
- hcloud_volume - Fix idempotency when attaching a server to a volume.
- ibm_storage - Added a check for null fields in ibm_storage utils module.
- include_tasks - whitelist ``listen`` as a valid keyword
- k8s - resource updates applied with force work correctly now
- keep results subset also when not no_log.
- meraki_switchport - improve reliability with native VLAN functionality.
- netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
clearing functionality
- netapp_e_volumes - fix workload profileId indexing when no previous workload
tags exist on the storage array.
- nxos_acl some platforms/versions raise when no ACLs are present
- nxos_facts fix <https://github.com/ansible/ansible/pull/57009>
- nxos_file_copy fix passwordless workflow
- nxos_interface Fix admin_state check for n6k
- nxos_snmp_traps fix group all for N35 platforms
- nxos_snmp_user fix platform fixes for get_snmp_user
- nxos_vlan mode idempotence bug
- nxos_vlan vlan names containing regex ctl chars should be escaped
- nxos_vtp_* modules fix n6k issues
- openssl_certificate - fix private key passphrase handling for
``cryptography`` backend.
- openssl_pkcs12 - fixes crash when private key has a passphrase and the module
is run a second time.
- os_stack - Apply tags conditionally so that the module does not throw up an
error when using an older distro of openstacksdk
- pass correct loading context to persistent connections other than local
- pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
- postgresql - added initial SSL related tests
- postgresql - added missing_required_libs, removed excess param mapping
- postgresql - move connect_to_db and get_pg_version into
module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)
- postgresql_db - add note to the documentation about state dump and the
incorrect rc (https://github.com/ansible/ansible/pull/57297)
- postgresql_db - fix for postgresql_db fails if stderr contains output
- postgresql_ping - fixed a typo in the module documentation
- preserve actual ssh error when we cannot connect.
- route53_facts - the module did not advertise check mode support, causing it
not to be run in check mode.
- sysctl: the module now also checks the output of STDERR to report if values
are correctly set (https://github.com/ansible/ansible/pull/55695)
- ufw - correctly check status when logging is off
- uri - always return a value for status even during failure
- urls - Handle redirects properly for IPv6 address by not splitting on ``:``
and rely on already parsed hostname and port values
- vmware_vm_facts - fix the support with regular ESXi
- vyos_interface fix <https://github.com/ansible/ansible/pull/57169>
- we don't really need to template vars on definition as we do this on demand
in templating.
- win_acl - Fix qualifier parser when using UNC paths -
- win_hostname - Fix non netbios compliant name handling
- winrm - Fix issue when attempting to parse CLIXML on send input failure
- xenserver_guest - fixed an issue where VM whould be powered off even though
check mode is used if reconfiguration requires VM to be powered off.
- xenserver_guest - proper error message is shown when maximum number of
network interfaces is reached and multiple network interfaces are added at
once.
- yum - Fix false error message about autoremove not being supported
- yum - fix failure when using ``update_cache`` standalone
- yum - handle special '_none_' value for proxy in yum.conf and .repo files
Update to version 2.8.0
Major changes:
* Experimental support for Ansible Collections and content namespacing -
Ansible content can now be packaged in a collection and addressed via
namespaces. This allows for easier sharing, distribution, and installation
of bundled modules/roles/plugins, and consistent rules for accessing
specific content via namespaces.
* Python interpreter discovery - The first time a Python module runs on a
target, Ansible will attempt to discover the proper default Python
interpreter to use for the target platform/version (instead of immediately
defaulting to /usr/bin/python). You can override this behavior by
setting ansible_python_interpreter or via config.
(see https://github.com/ansible/ansible/pull/50163)
* become - The deprecated CLI arguments for --sudo, --sudo-user,
--ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in
favor of the more generic --become, --become-user, --become-method, and
--ask-become-pass.
* become - become functionality has been migrated to a plugin architecture,
to allow customization of become functionality and 3rd party become methods
(https://github.com/ansible/ansible/pull/50991)
- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837
For the full changelog see /usr/share/doc/packages/ansible/changelogs or online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
Patchnames: openSUSE-2019-1635
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
Threats
Impact
low
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
References
23 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ansible",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ansible fixes the following issues:\n\nAnsible was updated to version 2.8.1:\n\nFull changelog is at /usr/share/doc/packages/ansible/changelogs/\n\n- Bugfixes\n\n - ACI - DO not encode query_string\n - ACI modules - Fix non-signature authentication\n - Add missing directory provided via ``--playbook-dir`` to adjacent collection loading\n - Fix \u0027Interface not found\u0027 errors when using eos_l2_interface with nonexistant\n interfaces configured\n - Fix cannot get credential when `source_auth` set to `credential_file`.\n - Fix netconf_config backup string issue\n - Fix privilege escalation support for the docker connection plugin when\n credentials need to be supplied (e.g. sudo with password).\n - Fix vyos cli prompt inspection\n - Fixed loading namespaced documentation fragments from collections.\n - Fixing bug came up after running cnos_vrf module against coverity.\n - Properly handle data importer failures on PVC creation, instead of timing out.\n - To fix the ios static route TC failure in CI\n - To fix the nios member module params\n - To fix the nios_zone module idempotency failure\n - add terminal initial prompt for initial connection\n - allow include_role to work with ansible command\n - allow python_requirements_facts to report on dependencies containing dashes\n - asa_config fix\n - azure_rm_roledefinition - fix a small error in build scope.\n - azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network\n peering.\n - cgroup_perf_recap - When not using file_per_task, make sure we don\u0027t\n prematurely close the perf files\n - display underlying error when reporting an invalid ``tasks:`` block.\n - dnf - fix wildcard matching for state: absent\n - docker connection plugin - accept version ``dev`` as \u0027newest version\u0027 and\n print warning.\n - docker_container - ``oom_killer`` and ``oom_score_adj`` options are available\n since docker-py 1.8.0, not 2.0.0 as assumed by the version check.\n - docker_container - fix network creation when ``networks_cli_compatible`` is\n enabled.\n - docker_container - use docker API\u0027s ``restart`` instead of ``stop``/``start``\n to restart a container.\n - docker_image - if ``build`` was not specified, the wrong default for\n ``build.rm`` is used.\n - docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the\n module failed.\n - docker_image - module failed when ``source: build`` was set but\n ``build.path`` options not specified.\n - docker_network module - fix idempotency when using ``aux_addresses`` in\n ``ipam_config``.\n - ec2_instance - make Name tag idempotent\n - eos: don\u0027t fail modules without become set, instead show message and continue\n - eos_config: check for session support when asked to \u0027diff_against: session\u0027\n - eos_eapi: fix idempotency issues when vrf was unspecified.\n - fix bugs for ce - more info see\n - fix incorrect uses of to_native that should be to_text instead.\n - hcloud_volume - Fix idempotency when attaching a server to a volume.\n - ibm_storage - Added a check for null fields in ibm_storage utils module.\n - include_tasks - whitelist ``listen`` as a valid keyword\n - k8s - resource updates applied with force work correctly now\n - keep results subset also when not no_log.\n - meraki_switchport - improve reliability with native VLAN functionality.\n - netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and\n clearing functionality\n - netapp_e_volumes - fix workload profileId indexing when no previous workload\n tags exist on the storage array.\n - nxos_acl some platforms/versions raise when no ACLs are present\n - nxos_facts fix \u003chttps://github.com/ansible/ansible/pull/57009\u003e\n - nxos_file_copy fix passwordless workflow\n - nxos_interface Fix admin_state check for n6k\n - nxos_snmp_traps fix group all for N35 platforms\n - nxos_snmp_user fix platform fixes for get_snmp_user\n - nxos_vlan mode idempotence bug\n - nxos_vlan vlan names containing regex ctl chars should be escaped\n - nxos_vtp_* modules fix n6k issues\n - openssl_certificate - fix private key passphrase handling for\n ``cryptography`` backend.\n - openssl_pkcs12 - fixes crash when private key has a passphrase and the module\n is run a second time.\n - os_stack - Apply tags conditionally so that the module does not throw up an\n error when using an older distro of openstacksdk\n - pass correct loading context to persistent connections other than local\n - pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux\n - postgresql - added initial SSL related tests\n - postgresql - added missing_required_libs, removed excess param mapping\n - postgresql - move connect_to_db and get_pg_version into\n module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)\n - postgresql_db - add note to the documentation about state dump and the\n incorrect rc (https://github.com/ansible/ansible/pull/57297)\n - postgresql_db - fix for postgresql_db fails if stderr contains output\n - postgresql_ping - fixed a typo in the module documentation\n - preserve actual ssh error when we cannot connect.\n - route53_facts - the module did not advertise check mode support, causing it\n not to be run in check mode.\n - sysctl: the module now also checks the output of STDERR to report if values\n are correctly set (https://github.com/ansible/ansible/pull/55695)\n - ufw - correctly check status when logging is off\n - uri - always return a value for status even during failure\n - urls - Handle redirects properly for IPv6 address by not splitting on ``:``\n and rely on already parsed hostname and port values\n - vmware_vm_facts - fix the support with regular ESXi\n - vyos_interface fix \u003chttps://github.com/ansible/ansible/pull/57169\u003e\n - we don\u0027t really need to template vars on definition as we do this on demand\n in templating.\n - win_acl - Fix qualifier parser when using UNC paths -\n - win_hostname - Fix non netbios compliant name handling\n - winrm - Fix issue when attempting to parse CLIXML on send input failure\n - xenserver_guest - fixed an issue where VM whould be powered off even though\n check mode is used if reconfiguration requires VM to be powered off.\n - xenserver_guest - proper error message is shown when maximum number of\n network interfaces is reached and multiple network interfaces are added at\n once.\n - yum - Fix false error message about autoremove not being supported\n - yum - fix failure when using ``update_cache`` standalone\n - yum - handle special \u0027_none_\u0027 value for proxy in yum.conf and .repo files\n\nUpdate to version 2.8.0\n\nMajor changes:\n\n * Experimental support for Ansible Collections and content namespacing -\n Ansible content can now be packaged in a collection and addressed via\n namespaces. This allows for easier sharing, distribution, and installation\n of bundled modules/roles/plugins, and consistent rules for accessing\n specific content via namespaces.\n * Python interpreter discovery - The first time a Python module runs on a\n target, Ansible will attempt to discover the proper default Python\n interpreter to use for the target platform/version (instead of immediately\n defaulting to /usr/bin/python). You can override this behavior by\n setting ansible_python_interpreter or via config. \n (see https://github.com/ansible/ansible/pull/50163)\n * become - The deprecated CLI arguments for --sudo, --sudo-user,\n --ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in\n favor of the more generic --become, --become-user, --become-method, and\n --ask-become-pass.\n * become - become functionality has been migrated to a plugin architecture,\n to allow customization of become functionality and 3rd party become methods\n (https://github.com/ansible/ansible/pull/50991)\n\n- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837\n\nFor the full changelog see /usr/share/doc/packages/ansible/changelogs or online:\nhttps://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1635",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1635-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1635-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNUI5PK7YDZ2U7TUWHBUA2RBMOIH2AMY/#CNUI5PK7YDZ2U7TUWHBUA2RBMOIH2AMY"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1635-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNUI5PK7YDZ2U7TUWHBUA2RBMOIH2AMY/#CNUI5PK7YDZ2U7TUWHBUA2RBMOIH2AMY"
},
{
"category": "self",
"summary": "SUSE Bug 1109957",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "self",
"summary": "SUSE Bug 1112959",
"url": "https://bugzilla.suse.com/1112959"
},
{
"category": "self",
"summary": "SUSE Bug 1118896",
"url": "https://bugzilla.suse.com/1118896"
},
{
"category": "self",
"summary": "SUSE Bug 1126503",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16837 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16859 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3828 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3828/"
}
],
"title": "Security update for ansible",
"tracking": {
"current_release_date": "2019-06-27T05:50:47Z",
"generator": {
"date": "2019-06-27T05:50:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1635-1",
"initial_release_date": "2019-06-27T05:50:47Z",
"revision_history": [
{
"date": "2019-06-27T05:50:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.8.1-bp150.3.9.1.noarch",
"product": {
"name": "ansible-2.8.1-bp150.3.9.1.noarch",
"product_id": "ansible-2.8.1-bp150.3.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.8.1-bp150.3.9.1.noarch as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch"
},
"product_reference": "ansible-2.8.1-bp150.3.9.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.8.1-bp150.3.9.1.noarch as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch"
},
"product_reference": "ansible-2.8.1-bp150.3.9.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.8.1-bp150.3.9.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch"
},
"product_reference": "ansible-2.8.1-bp150.3.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.8.1-bp150.3.9.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
},
"product_reference": "ansible-2.8.1-bp150.3.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16837"
}
],
"notes": [
{
"category": "general",
"text": "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16837",
"url": "https://www.suse.com/security/cve/CVE-2018-16837"
},
{
"category": "external",
"summary": "SUSE Bug 1112959 for CVE-2018-16837",
"url": "https://bugzilla.suse.com/1112959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-27T05:50:47Z",
"details": "important"
}
],
"title": "CVE-2018-16837"
},
{
"cve": "CVE-2018-16859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16859"
}
],
"notes": [
{
"category": "general",
"text": "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for \u0027become\u0027 passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16859",
"url": "https://www.suse.com/security/cve/CVE-2018-16859"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1116587 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1116587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-27T05:50:47Z",
"details": "moderate"
}
],
"title": "CVE-2018-16859"
},
{
"cve": "CVE-2018-16876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16876"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16876",
"url": "https://www.suse.com/security/cve/CVE-2018-16876"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1118896 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1118896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-27T05:50:47Z",
"details": "low"
}
],
"title": "CVE-2018-16876"
},
{
"cve": "CVE-2019-3828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3828"
}
],
"notes": [
{
"category": "general",
"text": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3828",
"url": "https://www.suse.com/security/cve/CVE-2019-3828"
},
{
"category": "external",
"summary": "SUSE Bug 1126503 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:ansible-2.8.1-bp150.3.9.1.noarch",
"SUSE Package Hub 15:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.0:ansible-2.8.1-bp150.3.9.1.noarch",
"openSUSE Leap 15.1:ansible-2.8.1-bp150.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-27T05:50:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-3828"
}
]
}
OPENSUSE-SU-2019:1858-1
Vulnerability from csaf_opensuse - Published: 2019-08-13 14:05 - Updated: 2019-08-13 14:05Summary
Security update for ansible
Severity
Moderate
Notes
Title of the patch: Security update for ansible
Description of the patch: This update for ansible fixes the following issues:
Ansible was updated to version 2.8.1:
Full changelog is at /usr/share/doc/packages/ansible/changelogs/
- Bugfixes
- ACI - DO not encode query_string
- ACI modules - Fix non-signature authentication
- Add missing directory provided via ``--playbook-dir`` to adjacent collection loading
- Fix 'Interface not found' errors when using eos_l2_interface with nonexistant
interfaces configured
- Fix cannot get credential when `source_auth` set to `credential_file`.
- Fix netconf_config backup string issue
- Fix privilege escalation support for the docker connection plugin when
credentials need to be supplied (e.g. sudo with password).
- Fix vyos cli prompt inspection
- Fixed loading namespaced documentation fragments from collections.
- Fixing bug came up after running cnos_vrf module against coverity.
- Properly handle data importer failures on PVC creation, instead of timing out.
- To fix the ios static route TC failure in CI
- To fix the nios member module params
- To fix the nios_zone module idempotency failure
- add terminal initial prompt for initial connection
- allow include_role to work with ansible command
- allow python_requirements_facts to report on dependencies containing dashes
- asa_config fix
- azure_rm_roledefinition - fix a small error in build scope.
- azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network
peering.
- cgroup_perf_recap - When not using file_per_task, make sure we don't
prematurely close the perf files
- display underlying error when reporting an invalid ``tasks:`` block.
- dnf - fix wildcard matching for state: absent
- docker connection plugin - accept version ``dev`` as 'newest version' and
print warning.
- docker_container - ``oom_killer`` and ``oom_score_adj`` options are available
since docker-py 1.8.0, not 2.0.0 as assumed by the version check.
- docker_container - fix network creation when ``networks_cli_compatible`` is
enabled.
- docker_container - use docker API's ``restart`` instead of ``stop``/``start``
to restart a container.
- docker_image - if ``build`` was not specified, the wrong default for
``build.rm`` is used.
- docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the
module failed.
- docker_image - module failed when ``source: build`` was set but
``build.path`` options not specified.
- docker_network module - fix idempotency when using ``aux_addresses`` in
``ipam_config``.
- ec2_instance - make Name tag idempotent
- eos: don't fail modules without become set, instead show message and continue
- eos_config: check for session support when asked to 'diff_against: session'
- eos_eapi: fix idempotency issues when vrf was unspecified.
- fix bugs for ce - more info see
- fix incorrect uses of to_native that should be to_text instead.
- hcloud_volume - Fix idempotency when attaching a server to a volume.
- ibm_storage - Added a check for null fields in ibm_storage utils module.
- include_tasks - whitelist ``listen`` as a valid keyword
- k8s - resource updates applied with force work correctly now
- keep results subset also when not no_log.
- meraki_switchport - improve reliability with native VLAN functionality.
- netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and
clearing functionality
- netapp_e_volumes - fix workload profileId indexing when no previous workload
tags exist on the storage array.
- nxos_acl some platforms/versions raise when no ACLs are present
- nxos_facts fix <https://github.com/ansible/ansible/pull/57009>
- nxos_file_copy fix passwordless workflow
- nxos_interface Fix admin_state check for n6k
- nxos_snmp_traps fix group all for N35 platforms
- nxos_snmp_user fix platform fixes for get_snmp_user
- nxos_vlan mode idempotence bug
- nxos_vlan vlan names containing regex ctl chars should be escaped
- nxos_vtp_* modules fix n6k issues
- openssl_certificate - fix private key passphrase handling for
``cryptography`` backend.
- openssl_pkcs12 - fixes crash when private key has a passphrase and the module
is run a second time.
- os_stack - Apply tags conditionally so that the module does not throw up an
error when using an older distro of openstacksdk
- pass correct loading context to persistent connections other than local
- pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux
- postgresql - added initial SSL related tests
- postgresql - added missing_required_libs, removed excess param mapping
- postgresql - move connect_to_db and get_pg_version into
module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)
- postgresql_db - add note to the documentation about state dump and the
incorrect rc (https://github.com/ansible/ansible/pull/57297)
- postgresql_db - fix for postgresql_db fails if stderr contains output
- postgresql_ping - fixed a typo in the module documentation
- preserve actual ssh error when we cannot connect.
- route53_facts - the module did not advertise check mode support, causing it
not to be run in check mode.
- sysctl: the module now also checks the output of STDERR to report if values
are correctly set (https://github.com/ansible/ansible/pull/55695)
- ufw - correctly check status when logging is off
- uri - always return a value for status even during failure
- urls - Handle redirects properly for IPv6 address by not splitting on ``:``
and rely on already parsed hostname and port values
- vmware_vm_facts - fix the support with regular ESXi
- vyos_interface fix <https://github.com/ansible/ansible/pull/57169>
- we don't really need to template vars on definition as we do this on demand
in templating.
- win_acl - Fix qualifier parser when using UNC paths -
- win_hostname - Fix non netbios compliant name handling
- winrm - Fix issue when attempting to parse CLIXML on send input failure
- xenserver_guest - fixed an issue where VM whould be powered off even though
check mode is used if reconfiguration requires VM to be powered off.
- xenserver_guest - proper error message is shown when maximum number of
network interfaces is reached and multiple network interfaces are added at
once.
- yum - Fix false error message about autoremove not being supported
- yum - fix failure when using ``update_cache`` standalone
- yum - handle special '_none_' value for proxy in yum.conf and .repo files
Update to version 2.8.0
Major changes:
* Experimental support for Ansible Collections and content namespacing -
Ansible content can now be packaged in a collection and addressed via
namespaces. This allows for easier sharing, distribution, and installation
of bundled modules/roles/plugins, and consistent rules for accessing
specific content via namespaces.
* Python interpreter discovery - The first time a Python module runs on a
target, Ansible will attempt to discover the proper default Python
interpreter to use for the target platform/version (instead of immediately
defaulting to /usr/bin/python). You can override this behavior by
setting ansible_python_interpreter or via config.
(see https://github.com/ansible/ansible/pull/50163)
* become - The deprecated CLI arguments for --sudo, --sudo-user,
--ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in
favor of the more generic --become, --become-user, --become-method, and
--ask-become-pass.
* become - become functionality has been migrated to a plugin architecture,
to allow customization of become functionality and 3rd party become methods
(https://github.com/ansible/ansible/pull/50991)
- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837
For the full changelog see /usr/share/doc/packages/ansible/changelogs or online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patchnames: openSUSE-2019-1858
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch | — |
Vendor Fix
|
Threats
Impact
low
4.2 (Medium)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch | — |
Vendor Fix
|
Threats
Impact
moderate
References
23 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ansible",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ansible fixes the following issues:\n\nAnsible was updated to version 2.8.1:\n\nFull changelog is at /usr/share/doc/packages/ansible/changelogs/\n\n- Bugfixes\n\n - ACI - DO not encode query_string\n - ACI modules - Fix non-signature authentication\n - Add missing directory provided via ``--playbook-dir`` to adjacent collection loading\n - Fix \u0027Interface not found\u0027 errors when using eos_l2_interface with nonexistant\n interfaces configured\n - Fix cannot get credential when `source_auth` set to `credential_file`.\n - Fix netconf_config backup string issue\n - Fix privilege escalation support for the docker connection plugin when\n credentials need to be supplied (e.g. sudo with password).\n - Fix vyos cli prompt inspection\n - Fixed loading namespaced documentation fragments from collections.\n - Fixing bug came up after running cnos_vrf module against coverity.\n - Properly handle data importer failures on PVC creation, instead of timing out.\n - To fix the ios static route TC failure in CI\n - To fix the nios member module params\n - To fix the nios_zone module idempotency failure\n - add terminal initial prompt for initial connection\n - allow include_role to work with ansible command\n - allow python_requirements_facts to report on dependencies containing dashes\n - asa_config fix\n - azure_rm_roledefinition - fix a small error in build scope.\n - azure_rm_virtualnetworkpeering - fix cross subscriptions virtual network\n peering.\n - cgroup_perf_recap - When not using file_per_task, make sure we don\u0027t\n prematurely close the perf files\n - display underlying error when reporting an invalid ``tasks:`` block.\n - dnf - fix wildcard matching for state: absent\n - docker connection plugin - accept version ``dev`` as \u0027newest version\u0027 and\n print warning.\n - docker_container - ``oom_killer`` and ``oom_score_adj`` options are available\n since docker-py 1.8.0, not 2.0.0 as assumed by the version check.\n - docker_container - fix network creation when ``networks_cli_compatible`` is\n enabled.\n - docker_container - use docker API\u0027s ``restart`` instead of ``stop``/``start``\n to restart a container.\n - docker_image - if ``build`` was not specified, the wrong default for\n ``build.rm`` is used.\n - docker_image - if ``nocache`` set to ``yes`` but not ``build.nocache``, the\n module failed.\n - docker_image - module failed when ``source: build`` was set but\n ``build.path`` options not specified.\n - docker_network module - fix idempotency when using ``aux_addresses`` in\n ``ipam_config``.\n - ec2_instance - make Name tag idempotent\n - eos: don\u0027t fail modules without become set, instead show message and continue\n - eos_config: check for session support when asked to \u0027diff_against: session\u0027\n - eos_eapi: fix idempotency issues when vrf was unspecified.\n - fix bugs for ce - more info see\n - fix incorrect uses of to_native that should be to_text instead.\n - hcloud_volume - Fix idempotency when attaching a server to a volume.\n - ibm_storage - Added a check for null fields in ibm_storage utils module.\n - include_tasks - whitelist ``listen`` as a valid keyword\n - k8s - resource updates applied with force work correctly now\n - keep results subset also when not no_log.\n - meraki_switchport - improve reliability with native VLAN functionality.\n - netapp_e_iscsi_target - fix netapp_e_iscsi_target chap secret size and\n clearing functionality\n - netapp_e_volumes - fix workload profileId indexing when no previous workload\n tags exist on the storage array.\n - nxos_acl some platforms/versions raise when no ACLs are present\n - nxos_facts fix \u003chttps://github.com/ansible/ansible/pull/57009\u003e\n - nxos_file_copy fix passwordless workflow\n - nxos_interface Fix admin_state check for n6k\n - nxos_snmp_traps fix group all for N35 platforms\n - nxos_snmp_user fix platform fixes for get_snmp_user\n - nxos_vlan mode idempotence bug\n - nxos_vlan vlan names containing regex ctl chars should be escaped\n - nxos_vtp_* modules fix n6k issues\n - openssl_certificate - fix private key passphrase handling for\n ``cryptography`` backend.\n - openssl_pkcs12 - fixes crash when private key has a passphrase and the module\n is run a second time.\n - os_stack - Apply tags conditionally so that the module does not throw up an\n error when using an older distro of openstacksdk\n - pass correct loading context to persistent connections other than local\n - pkg_mgr - Ansible 2.8.0 failing to install yum packages on Amazon Linux\n - postgresql - added initial SSL related tests\n - postgresql - added missing_required_libs, removed excess param mapping\n - postgresql - move connect_to_db and get_pg_version into\n module_utils/postgres.py (https://github.com/ansible/ansible/pull/55514)\n - postgresql_db - add note to the documentation about state dump and the\n incorrect rc (https://github.com/ansible/ansible/pull/57297)\n - postgresql_db - fix for postgresql_db fails if stderr contains output\n - postgresql_ping - fixed a typo in the module documentation\n - preserve actual ssh error when we cannot connect.\n - route53_facts - the module did not advertise check mode support, causing it\n not to be run in check mode.\n - sysctl: the module now also checks the output of STDERR to report if values\n are correctly set (https://github.com/ansible/ansible/pull/55695)\n - ufw - correctly check status when logging is off\n - uri - always return a value for status even during failure\n - urls - Handle redirects properly for IPv6 address by not splitting on ``:``\n and rely on already parsed hostname and port values\n - vmware_vm_facts - fix the support with regular ESXi\n - vyos_interface fix \u003chttps://github.com/ansible/ansible/pull/57169\u003e\n - we don\u0027t really need to template vars on definition as we do this on demand\n in templating.\n - win_acl - Fix qualifier parser when using UNC paths -\n - win_hostname - Fix non netbios compliant name handling\n - winrm - Fix issue when attempting to parse CLIXML on send input failure\n - xenserver_guest - fixed an issue where VM whould be powered off even though\n check mode is used if reconfiguration requires VM to be powered off.\n - xenserver_guest - proper error message is shown when maximum number of\n network interfaces is reached and multiple network interfaces are added at\n once.\n - yum - Fix false error message about autoremove not being supported\n - yum - fix failure when using ``update_cache`` standalone\n - yum - handle special \u0027_none_\u0027 value for proxy in yum.conf and .repo files\n\nUpdate to version 2.8.0\n\nMajor changes:\n\n * Experimental support for Ansible Collections and content namespacing -\n Ansible content can now be packaged in a collection and addressed via\n namespaces. This allows for easier sharing, distribution, and installation\n of bundled modules/roles/plugins, and consistent rules for accessing\n specific content via namespaces.\n * Python interpreter discovery - The first time a Python module runs on a\n target, Ansible will attempt to discover the proper default Python\n interpreter to use for the target platform/version (instead of immediately\n defaulting to /usr/bin/python). You can override this behavior by\n setting ansible_python_interpreter or via config. \n (see https://github.com/ansible/ansible/pull/50163)\n * become - The deprecated CLI arguments for --sudo, --sudo-user,\n --ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed, in\n favor of the more generic --become, --become-user, --become-method, and\n --ask-become-pass.\n * become - become functionality has been migrated to a plugin architecture,\n to allow customization of become functionality and 3rd party become methods\n (https://github.com/ansible/ansible/pull/50991)\n\n- addresses CVE-2018-16859, CVE-2018-16876, CVE-2019-3828, CVE-2018-16837\n\nFor the full changelog see /usr/share/doc/packages/ansible/changelogs or online:\nhttps://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst\n\n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1858",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1858-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1858-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1858-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV/#MKMF4U3GCXJKZXVSY6SNG3CYXN6J55VV"
},
{
"category": "self",
"summary": "SUSE Bug 1109957",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "self",
"summary": "SUSE Bug 1112959",
"url": "https://bugzilla.suse.com/1112959"
},
{
"category": "self",
"summary": "SUSE Bug 1118896",
"url": "https://bugzilla.suse.com/1118896"
},
{
"category": "self",
"summary": "SUSE Bug 1126503",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16837 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16859 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3828 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3828/"
}
],
"title": "Security update for ansible",
"tracking": {
"current_release_date": "2019-08-13T14:05:25Z",
"generator": {
"date": "2019-08-13T14:05:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1858-1",
"initial_release_date": "2019-08-13T14:05:25Z",
"revision_history": [
{
"date": "2019-08-13T14:05:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.8.1-bp151.3.3.1.noarch",
"product": {
"name": "ansible-2.8.1-bp151.3.3.1.noarch",
"product_id": "ansible-2.8.1-bp151.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP1",
"product": {
"name": "SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.8.1-bp151.3.3.1.noarch as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
},
"product_reference": "ansible-2.8.1-bp151.3.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16837"
}
],
"notes": [
{
"category": "general",
"text": "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16837",
"url": "https://www.suse.com/security/cve/CVE-2018-16837"
},
{
"category": "external",
"summary": "SUSE Bug 1112959 for CVE-2018-16837",
"url": "https://bugzilla.suse.com/1112959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-13T14:05:25Z",
"details": "important"
}
],
"title": "CVE-2018-16837"
},
{
"cve": "CVE-2018-16859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16859"
}
],
"notes": [
{
"category": "general",
"text": "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for \u0027become\u0027 passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16859",
"url": "https://www.suse.com/security/cve/CVE-2018-16859"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1116587 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1116587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-13T14:05:25Z",
"details": "moderate"
}
],
"title": "CVE-2018-16859"
},
{
"cve": "CVE-2018-16876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16876"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16876",
"url": "https://www.suse.com/security/cve/CVE-2018-16876"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1118896 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1118896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-13T14:05:25Z",
"details": "low"
}
],
"title": "CVE-2018-16876"
},
{
"cve": "CVE-2019-3828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3828"
}
],
"notes": [
{
"category": "general",
"text": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3828",
"url": "https://www.suse.com/security/cve/CVE-2019-3828"
},
{
"category": "external",
"summary": "SUSE Bug 1126503 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15 SP1:ansible-2.8.1-bp151.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-08-13T14:05:25Z",
"details": "moderate"
}
],
"title": "CVE-2019-3828"
}
]
}
OPENSUSE-SU-2024:10615-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
ansible-2.9.24-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: ansible-2.9.24-1.2 on GA media
Description of the patch: These are all security issues fixed in the ansible-2.9.24-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10615
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.1 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.3 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.5 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.9 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.6 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.4 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.2 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.1 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.2 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.5 (High)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.4 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.6 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.6 (Medium)
Affected products
Recommended
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
135 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ansible-2.9.24-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ansible-2.9.24-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10615",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10615-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9587 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7466 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7481 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7481/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10875 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16837 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16859 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10156 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10206 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14856 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14858 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14864 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14904 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3828 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10729 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14330 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14332 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1733 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1736 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1737 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1738 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1739 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1740 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1744 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1746 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20178 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20180 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20228 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3583/"
}
],
"title": "ansible-2.9.24-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10615-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.9.24-1.2.aarch64",
"product": {
"name": "ansible-2.9.24-1.2.aarch64",
"product_id": "ansible-2.9.24-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "ansible-doc-2.9.24-1.2.aarch64",
"product": {
"name": "ansible-doc-2.9.24-1.2.aarch64",
"product_id": "ansible-doc-2.9.24-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "ansible-test-2.9.24-1.2.aarch64",
"product": {
"name": "ansible-test-2.9.24-1.2.aarch64",
"product_id": "ansible-test-2.9.24-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.9.24-1.2.ppc64le",
"product": {
"name": "ansible-2.9.24-1.2.ppc64le",
"product_id": "ansible-2.9.24-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ansible-doc-2.9.24-1.2.ppc64le",
"product": {
"name": "ansible-doc-2.9.24-1.2.ppc64le",
"product_id": "ansible-doc-2.9.24-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ansible-test-2.9.24-1.2.ppc64le",
"product": {
"name": "ansible-test-2.9.24-1.2.ppc64le",
"product_id": "ansible-test-2.9.24-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.9.24-1.2.s390x",
"product": {
"name": "ansible-2.9.24-1.2.s390x",
"product_id": "ansible-2.9.24-1.2.s390x"
}
},
{
"category": "product_version",
"name": "ansible-doc-2.9.24-1.2.s390x",
"product": {
"name": "ansible-doc-2.9.24-1.2.s390x",
"product_id": "ansible-doc-2.9.24-1.2.s390x"
}
},
{
"category": "product_version",
"name": "ansible-test-2.9.24-1.2.s390x",
"product": {
"name": "ansible-test-2.9.24-1.2.s390x",
"product_id": "ansible-test-2.9.24-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-2.9.24-1.2.x86_64",
"product": {
"name": "ansible-2.9.24-1.2.x86_64",
"product_id": "ansible-2.9.24-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "ansible-doc-2.9.24-1.2.x86_64",
"product": {
"name": "ansible-doc-2.9.24-1.2.x86_64",
"product_id": "ansible-doc-2.9.24-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "ansible-test-2.9.24-1.2.x86_64",
"product": {
"name": "ansible-test-2.9.24-1.2.x86_64",
"product_id": "ansible-test-2.9.24-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.9.24-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64"
},
"product_reference": "ansible-2.9.24-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.9.24-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le"
},
"product_reference": "ansible-2.9.24-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.9.24-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x"
},
"product_reference": "ansible-2.9.24-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-2.9.24-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64"
},
"product_reference": "ansible-2.9.24-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-2.9.24-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64"
},
"product_reference": "ansible-doc-2.9.24-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-2.9.24-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le"
},
"product_reference": "ansible-doc-2.9.24-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-2.9.24-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x"
},
"product_reference": "ansible-doc-2.9.24-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-2.9.24-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64"
},
"product_reference": "ansible-doc-2.9.24-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-2.9.24-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64"
},
"product_reference": "ansible-test-2.9.24-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-2.9.24-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le"
},
"product_reference": "ansible-test-2.9.24-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-2.9.24-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x"
},
"product_reference": "ansible-test-2.9.24-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-2.9.24-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
},
"product_reference": "ansible-test-2.9.24-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-9587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9587"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible\u0027s handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9587",
"url": "https://www.suse.com/security/cve/CVE-2016-9587"
},
{
"category": "external",
"summary": "SUSE Bug 1019021 for CVE-2016-9587",
"url": "https://bugzilla.suse.com/1019021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9587"
},
{
"cve": "CVE-2017-7466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7466"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7466",
"url": "https://www.suse.com/security/cve/CVE-2017-7466"
},
{
"category": "external",
"summary": "SUSE Bug 1019021 for CVE-2017-7466",
"url": "https://bugzilla.suse.com/1019021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7466"
},
{
"cve": "CVE-2017-7481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7481"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as \u0027unsafe\u0027 and is not evaluated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7481",
"url": "https://www.suse.com/security/cve/CVE-2017-7481"
},
{
"category": "external",
"summary": "SUSE Bug 1038785 for CVE-2017-7481",
"url": "https://bugzilla.suse.com/1038785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7481"
},
{
"cve": "CVE-2017-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7550"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7550",
"url": "https://www.suse.com/security/cve/CVE-2017-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1035124 for CVE-2017-7550",
"url": "https://bugzilla.suse.com/1035124"
},
{
"category": "external",
"summary": "SUSE Bug 1065872 for CVE-2017-7550",
"url": "https://bugzilla.suse.com/1065872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7550"
},
{
"cve": "CVE-2018-10855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10855"
}
],
"notes": [
{
"category": "general",
"text": "Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10855",
"url": "https://www.suse.com/security/cve/CVE-2018-10855"
},
{
"category": "external",
"summary": "SUSE Bug 1097775 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1097775"
},
{
"category": "external",
"summary": "SUSE Bug 1099808 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1109957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10855"
},
{
"cve": "CVE-2018-10875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10875"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10875",
"url": "https://www.suse.com/security/cve/CVE-2018-10875"
},
{
"category": "external",
"summary": "SUSE Bug 1099808 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1109957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-10875"
},
{
"cve": "CVE-2018-16837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16837"
}
],
"notes": [
{
"category": "general",
"text": "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16837",
"url": "https://www.suse.com/security/cve/CVE-2018-16837"
},
{
"category": "external",
"summary": "SUSE Bug 1112959 for CVE-2018-16837",
"url": "https://bugzilla.suse.com/1112959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-16837"
},
{
"cve": "CVE-2018-16859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16859"
}
],
"notes": [
{
"category": "general",
"text": "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for \u0027become\u0027 passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16859",
"url": "https://www.suse.com/security/cve/CVE-2018-16859"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1116587 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1116587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16859"
},
{
"cve": "CVE-2018-16876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16876"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16876",
"url": "https://www.suse.com/security/cve/CVE-2018-16876"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1118896 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1118896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-16876"
},
{
"cve": "CVE-2019-10156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10156"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10156",
"url": "https://www.suse.com/security/cve/CVE-2019-10156"
},
{
"category": "external",
"summary": "SUSE Bug 1137528 for CVE-2019-10156",
"url": "https://bugzilla.suse.com/1137528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10156"
},
{
"cve": "CVE-2019-10206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10206"
}
],
"notes": [
{
"category": "general",
"text": "ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10206",
"url": "https://www.suse.com/security/cve/CVE-2019-10206"
},
{
"category": "external",
"summary": "SUSE Bug 1142690 for CVE-2019-10206",
"url": "https://bugzilla.suse.com/1142690"
},
{
"category": "external",
"summary": "SUSE Bug 1154232 for CVE-2019-10206",
"url": "https://bugzilla.suse.com/1154232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10206"
},
{
"cve": "CVE-2019-10217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10217"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10217",
"url": "https://www.suse.com/security/cve/CVE-2019-10217"
},
{
"category": "external",
"summary": "SUSE Bug 1144453 for CVE-2019-10217",
"url": "https://bugzilla.suse.com/1144453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10217"
},
{
"cve": "CVE-2019-14846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14846"
}
],
"notes": [
{
"category": "general",
"text": "In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14846",
"url": "https://www.suse.com/security/cve/CVE-2019-14846"
},
{
"category": "external",
"summary": "SUSE Bug 1153452 for CVE-2019-14846",
"url": "https://bugzilla.suse.com/1153452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14846"
},
{
"cve": "CVE-2019-14856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14856"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14856",
"url": "https://www.suse.com/security/cve/CVE-2019-14856"
},
{
"category": "external",
"summary": "SUSE Bug 1154232 for CVE-2019-14856",
"url": "https://bugzilla.suse.com/1154232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14856"
},
{
"cve": "CVE-2019-14858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14858"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14858",
"url": "https://www.suse.com/security/cve/CVE-2019-14858"
},
{
"category": "external",
"summary": "SUSE Bug 1154231 for CVE-2019-14858",
"url": "https://bugzilla.suse.com/1154231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14858"
},
{
"cve": "CVE-2019-14864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14864"
}
],
"notes": [
{
"category": "general",
"text": "Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14864",
"url": "https://www.suse.com/security/cve/CVE-2019-14864"
},
{
"category": "external",
"summary": "SUSE Bug 1154830 for CVE-2019-14864",
"url": "https://bugzilla.suse.com/1154830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14864"
},
{
"cve": "CVE-2019-14904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14904"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the \u0027ps\u0027 bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14904",
"url": "https://www.suse.com/security/cve/CVE-2019-14904"
},
{
"category": "external",
"summary": "SUSE Bug 1157968 for CVE-2019-14904",
"url": "https://bugzilla.suse.com/1157968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14904"
},
{
"cve": "CVE-2019-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14905"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible\u0027s nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14905",
"url": "https://www.suse.com/security/cve/CVE-2019-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1157969 for CVE-2019-14905",
"url": "https://bugzilla.suse.com/1157969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14905"
},
{
"cve": "CVE-2019-3828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3828"
}
],
"notes": [
{
"category": "general",
"text": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3828",
"url": "https://www.suse.com/security/cve/CVE-2019-3828"
},
{
"category": "external",
"summary": "SUSE Bug 1126503 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3828"
},
{
"cve": "CVE-2020-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10684"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10684",
"url": "https://www.suse.com/security/cve/CVE-2020-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1167532 for CVE-2020-10684",
"url": "https://bugzilla.suse.com/1167532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10684"
},
{
"cve": "CVE-2020-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10685"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10685",
"url": "https://www.suse.com/security/cve/CVE-2020-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1167440 for CVE-2020-10685",
"url": "https://bugzilla.suse.com/1167440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10685"
},
{
"cve": "CVE-2020-10691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10691"
}
],
"notes": [
{
"category": "general",
"text": "An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10691",
"url": "https://www.suse.com/security/cve/CVE-2020-10691"
},
{
"category": "external",
"summary": "SUSE Bug 1167873 for CVE-2020-10691",
"url": "https://bugzilla.suse.com/1167873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10691"
},
{
"cve": "CVE-2020-10729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10729"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10729",
"url": "https://www.suse.com/security/cve/CVE-2020-10729"
},
{
"category": "external",
"summary": "SUSE Bug 1171162 for CVE-2020-10729",
"url": "https://bugzilla.suse.com/1171162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10729"
},
{
"cve": "CVE-2020-14330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14330"
}
],
"notes": [
{
"category": "general",
"text": "An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14330",
"url": "https://www.suse.com/security/cve/CVE-2020-14330"
},
{
"category": "external",
"summary": "SUSE Bug 1174145 for CVE-2020-14330",
"url": "https://bugzilla.suse.com/1174145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14330"
},
{
"cve": "CVE-2020-14332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14332"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14332",
"url": "https://www.suse.com/security/cve/CVE-2020-14332"
},
{
"category": "external",
"summary": "SUSE Bug 1174302 for CVE-2020-14332",
"url": "https://bugzilla.suse.com/1174302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14332"
},
{
"cve": "CVE-2020-1733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1733"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 \u0026\u0026 mkdir -p \u003cdir\u003e\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating \u0027/proc/\u003cpid\u003e/cmdline\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1733",
"url": "https://www.suse.com/security/cve/CVE-2020-1733"
},
{
"category": "external",
"summary": "SUSE Bug 1164140 for CVE-2020-1733",
"url": "https://bugzilla.suse.com/1164140"
},
{
"category": "external",
"summary": "SUSE Bug 1171823 for CVE-2020-1733",
"url": "https://bugzilla.suse.com/1171823"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1733"
},
{
"cve": "CVE-2020-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1734",
"url": "https://www.suse.com/security/cve/CVE-2020-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1164139 for CVE-2020-1734",
"url": "https://bugzilla.suse.com/1164139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1734"
},
{
"cve": "CVE-2020-1735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1735",
"url": "https://www.suse.com/security/cve/CVE-2020-1735"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2020-1735",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1735"
},
{
"cve": "CVE-2020-1736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1736"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1736",
"url": "https://www.suse.com/security/cve/CVE-2020-1736"
},
{
"category": "external",
"summary": "SUSE Bug 1164134 for CVE-2020-1736",
"url": "https://bugzilla.suse.com/1164134"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-1736"
},
{
"cve": "CVE-2020-1737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1737"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1737",
"url": "https://www.suse.com/security/cve/CVE-2020-1737"
},
{
"category": "external",
"summary": "SUSE Bug 1164138 for CVE-2020-1737",
"url": "https://bugzilla.suse.com/1164138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1737"
},
{
"cve": "CVE-2020-1738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1738"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when the module package or service is used and the parameter \u0027use\u0027 is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1738",
"url": "https://www.suse.com/security/cve/CVE-2020-1738"
},
{
"category": "external",
"summary": "SUSE Bug 1164136 for CVE-2020-1738",
"url": "https://bugzilla.suse.com/1164136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1738"
},
{
"cve": "CVE-2020-1739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1739"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1739",
"url": "https://www.suse.com/security/cve/CVE-2020-1739"
},
{
"category": "external",
"summary": "SUSE Bug 1164133 for CVE-2020-1739",
"url": "https://bugzilla.suse.com/1164133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1739"
},
{
"cve": "CVE-2020-1740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1740"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1740",
"url": "https://www.suse.com/security/cve/CVE-2020-1740"
},
{
"category": "external",
"summary": "SUSE Bug 1164135 for CVE-2020-1740",
"url": "https://bugzilla.suse.com/1164135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-1740"
},
{
"cve": "CVE-2020-1744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1744"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1744",
"url": "https://www.suse.com/security/cve/CVE-2020-1744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1744"
},
{
"cve": "CVE-2020-1746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1746"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1746",
"url": "https://www.suse.com/security/cve/CVE-2020-1746"
},
{
"category": "external",
"summary": "SUSE Bug 1165393 for CVE-2020-1746",
"url": "https://bugzilla.suse.com/1165393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1746"
},
{
"cve": "CVE-2020-1753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1753"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1753",
"url": "https://www.suse.com/security/cve/CVE-2020-1753"
},
{
"category": "external",
"summary": "SUSE Bug 1166389 for CVE-2020-1753",
"url": "https://bugzilla.suse.com/1166389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1753"
},
{
"cve": "CVE-2021-20178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20178"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20178",
"url": "https://www.suse.com/security/cve/CVE-2021-20178"
},
{
"category": "external",
"summary": "SUSE Bug 1180816 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1180816"
},
{
"category": "external",
"summary": "SUSE Bug 1186493 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1186493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20178"
},
{
"cve": "CVE-2021-20180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20180"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20180",
"url": "https://www.suse.com/security/cve/CVE-2021-20180"
},
{
"category": "external",
"summary": "SUSE Bug 1180942 for CVE-2021-20180",
"url": "https://bugzilla.suse.com/1180942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20180"
},
{
"cve": "CVE-2021-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20191"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20191",
"url": "https://www.suse.com/security/cve/CVE-2021-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1181119 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181119"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20191"
},
{
"cve": "CVE-2021-20228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20228"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20228",
"url": "https://www.suse.com/security/cve/CVE-2021-20228"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20228",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20228"
},
{
"cve": "CVE-2021-3583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3583"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible, where a user\u0027s controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3583",
"url": "https://www.suse.com/security/cve/CVE-2021-3583"
},
{
"category": "external",
"summary": "SUSE Bug 1188061 for CVE-2021-3583",
"url": "https://bugzilla.suse.com/1188061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-doc-2.9.24-1.2.x86_64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.aarch64",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.ppc64le",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.s390x",
"openSUSE Tumbleweed:ansible-test-2.9.24-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3583"
}
]
}
OPENSUSE-SU-2024:14244-1
Vulnerability from csaf_opensuse - Published: 2024-08-08 00:00 - Updated: 2024-08-08 00:00Summary
ansible-9-9.8.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: ansible-9-9.8.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the ansible-9-9.8.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-14244
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.1 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.5 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.9 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.6 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.4 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.2 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.1 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
7.5 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.4 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
5.6 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.6 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
146 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ansible-9-9.8.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ansible-9-9.8.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14244",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14244-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4966 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4967 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3908 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3096 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9587 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7466 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7481 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7481/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10875 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16837 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16859 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16876 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10156 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10206 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14856 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14858 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14864 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14904 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14905 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3828 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10691 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10729 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14330 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14332 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1733 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1736 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1737 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1738 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1739 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1740 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1744 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1746 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1753 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20178 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20180 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20228 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3583/"
}
],
"title": "ansible-9-9.8.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-08-08T00:00:00Z",
"generator": {
"date": "2024-08-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14244-1",
"initial_release_date": "2024-08-08T00:00:00Z",
"revision_history": [
{
"date": "2024-08-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ansible-9-9.8.0-1.1.aarch64",
"product": {
"name": "ansible-9-9.8.0-1.1.aarch64",
"product_id": "ansible-9-9.8.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-9-9.8.0-1.1.ppc64le",
"product": {
"name": "ansible-9-9.8.0-1.1.ppc64le",
"product_id": "ansible-9-9.8.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-9-9.8.0-1.1.s390x",
"product": {
"name": "ansible-9-9.8.0-1.1.s390x",
"product_id": "ansible-9-9.8.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-9-9.8.0-1.1.x86_64",
"product": {
"name": "ansible-9-9.8.0-1.1.x86_64",
"product_id": "ansible-9-9.8.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-9-9.8.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64"
},
"product_reference": "ansible-9-9.8.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-9-9.8.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le"
},
"product_reference": "ansible-9-9.8.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-9-9.8.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x"
},
"product_reference": "ansible-9-9.8.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-9-9.8.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
},
"product_reference": "ansible-9-9.8.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-4966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4966"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before 1.6.7 does not prevent inventory data with \"{{\" and \"lookup\" substrings, and does not prevent remote data with \"{{\" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup(\u0027pipe\u0027) calls or (2) crafted Jinja2 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4966",
"url": "https://www.suse.com/security/cve/CVE-2014-4966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4966"
},
{
"cve": "CVE-2014-4967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4967"
}
],
"notes": [
{
"category": "general",
"text": "Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing \" src=\" clause, (2) a trailing \" temp=\" clause, or (3) a trailing \" validate=\" clause accompanied by a shell command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4967",
"url": "https://www.suse.com/security/cve/CVE-2014-4967"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4967"
},
{
"cve": "CVE-2015-3908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3908"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3908",
"url": "https://www.suse.com/security/cve/CVE-2015-3908"
},
{
"category": "external",
"summary": "SUSE Bug 938161 for CVE-2015-3908",
"url": "https://bugzilla.suse.com/938161"
},
{
"category": "external",
"summary": "SUSE Bug 938399 for CVE-2015-3908",
"url": "https://bugzilla.suse.com/938399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-3908"
},
{
"cve": "CVE-2016-3096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3096"
}
],
"notes": [
{
"category": "general",
"text": "The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3096",
"url": "https://www.suse.com/security/cve/CVE-2016-3096"
},
{
"category": "external",
"summary": "SUSE Bug 973546 for CVE-2016-3096",
"url": "https://bugzilla.suse.com/973546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3096"
},
{
"cve": "CVE-2016-9587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9587"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible\u0027s handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9587",
"url": "https://www.suse.com/security/cve/CVE-2016-9587"
},
{
"category": "external",
"summary": "SUSE Bug 1019021 for CVE-2016-9587",
"url": "https://bugzilla.suse.com/1019021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9587"
},
{
"cve": "CVE-2017-7466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7466"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7466",
"url": "https://www.suse.com/security/cve/CVE-2017-7466"
},
{
"category": "external",
"summary": "SUSE Bug 1019021 for CVE-2017-7466",
"url": "https://bugzilla.suse.com/1019021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7466"
},
{
"cve": "CVE-2017-7481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7481"
}
],
"notes": [
{
"category": "general",
"text": "Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as \u0027unsafe\u0027 and is not evaluated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7481",
"url": "https://www.suse.com/security/cve/CVE-2017-7481"
},
{
"category": "external",
"summary": "SUSE Bug 1038785 for CVE-2017-7481",
"url": "https://bugzilla.suse.com/1038785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7481"
},
{
"cve": "CVE-2017-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7550"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host\u0027s logs. This flaw was fixed by not allowing passwords to be specified in the \"params\" argument, and noting this in the module documentation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7550",
"url": "https://www.suse.com/security/cve/CVE-2017-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1035124 for CVE-2017-7550",
"url": "https://bugzilla.suse.com/1035124"
},
{
"category": "external",
"summary": "SUSE Bug 1065872 for CVE-2017-7550",
"url": "https://bugzilla.suse.com/1065872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7550"
},
{
"cve": "CVE-2018-10855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10855"
}
],
"notes": [
{
"category": "general",
"text": "Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10855",
"url": "https://www.suse.com/security/cve/CVE-2018-10855"
},
{
"category": "external",
"summary": "SUSE Bug 1097775 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1097775"
},
{
"category": "external",
"summary": "SUSE Bug 1099808 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-10855",
"url": "https://bugzilla.suse.com/1109957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10855"
},
{
"cve": "CVE-2018-10875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10875"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10875",
"url": "https://www.suse.com/security/cve/CVE-2018-10875"
},
{
"category": "external",
"summary": "SUSE Bug 1099808 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1099808"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-10875",
"url": "https://bugzilla.suse.com/1109957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-10875"
},
{
"cve": "CVE-2018-16837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16837"
}
],
"notes": [
{
"category": "general",
"text": "Ansible \"User\" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16837",
"url": "https://www.suse.com/security/cve/CVE-2018-16837"
},
{
"category": "external",
"summary": "SUSE Bug 1112959 for CVE-2018-16837",
"url": "https://bugzilla.suse.com/1112959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-16837"
},
{
"cve": "CVE-2018-16859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16859"
}
],
"notes": [
{
"category": "general",
"text": "Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for \u0027become\u0027 passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16859",
"url": "https://www.suse.com/security/cve/CVE-2018-16859"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1116587 for CVE-2018-16859",
"url": "https://bugzilla.suse.com/1116587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16859"
},
{
"cve": "CVE-2018-16876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16876"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16876",
"url": "https://www.suse.com/security/cve/CVE-2018-16876"
},
{
"category": "external",
"summary": "SUSE Bug 1109957 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1109957"
},
{
"category": "external",
"summary": "SUSE Bug 1118896 for CVE-2018-16876",
"url": "https://bugzilla.suse.com/1118896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-16876"
},
{
"cve": "CVE-2019-10156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10156"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10156",
"url": "https://www.suse.com/security/cve/CVE-2019-10156"
},
{
"category": "external",
"summary": "SUSE Bug 1137528 for CVE-2019-10156",
"url": "https://bugzilla.suse.com/1137528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10156"
},
{
"cve": "CVE-2019-10206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10206"
}
],
"notes": [
{
"category": "general",
"text": "ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10206",
"url": "https://www.suse.com/security/cve/CVE-2019-10206"
},
{
"category": "external",
"summary": "SUSE Bug 1142690 for CVE-2019-10206",
"url": "https://bugzilla.suse.com/1142690"
},
{
"category": "external",
"summary": "SUSE Bug 1154232 for CVE-2019-10206",
"url": "https://bugzilla.suse.com/1154232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10206"
},
{
"cve": "CVE-2019-10217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10217"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10217",
"url": "https://www.suse.com/security/cve/CVE-2019-10217"
},
{
"category": "external",
"summary": "SUSE Bug 1144453 for CVE-2019-10217",
"url": "https://bugzilla.suse.com/1144453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-10217"
},
{
"cve": "CVE-2019-14846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14846"
}
],
"notes": [
{
"category": "general",
"text": "In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14846",
"url": "https://www.suse.com/security/cve/CVE-2019-14846"
},
{
"category": "external",
"summary": "SUSE Bug 1153452 for CVE-2019-14846",
"url": "https://bugzilla.suse.com/1153452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14846"
},
{
"cve": "CVE-2019-14856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14856"
}
],
"notes": [
{
"category": "general",
"text": "ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14856",
"url": "https://www.suse.com/security/cve/CVE-2019-14856"
},
{
"category": "external",
"summary": "SUSE Bug 1154232 for CVE-2019-14856",
"url": "https://bugzilla.suse.com/1154232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14856"
},
{
"cve": "CVE-2019-14858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14858"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14858",
"url": "https://www.suse.com/security/cve/CVE-2019-14858"
},
{
"category": "external",
"summary": "SUSE Bug 1154231 for CVE-2019-14858",
"url": "https://bugzilla.suse.com/1154231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-14858"
},
{
"cve": "CVE-2019-14864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14864"
}
],
"notes": [
{
"category": "general",
"text": "Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14864",
"url": "https://www.suse.com/security/cve/CVE-2019-14864"
},
{
"category": "external",
"summary": "SUSE Bug 1154830 for CVE-2019-14864",
"url": "https://bugzilla.suse.com/1154830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14864"
},
{
"cve": "CVE-2019-14904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14904"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the \u0027ps\u0027 bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14904",
"url": "https://www.suse.com/security/cve/CVE-2019-14904"
},
{
"category": "external",
"summary": "SUSE Bug 1157968 for CVE-2019-14904",
"url": "https://bugzilla.suse.com/1157968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14904"
},
{
"cve": "CVE-2019-14905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14905"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible\u0027s nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14905",
"url": "https://www.suse.com/security/cve/CVE-2019-14905"
},
{
"category": "external",
"summary": "SUSE Bug 1157969 for CVE-2019-14905",
"url": "https://bugzilla.suse.com/1157969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14905"
},
{
"cve": "CVE-2019-3828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3828"
}
],
"notes": [
{
"category": "general",
"text": "Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3828",
"url": "https://www.suse.com/security/cve/CVE-2019-3828"
},
{
"category": "external",
"summary": "SUSE Bug 1126503 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1126503"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2019-3828",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3828"
},
{
"cve": "CVE-2020-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10684"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10684",
"url": "https://www.suse.com/security/cve/CVE-2020-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1167532 for CVE-2020-10684",
"url": "https://bugzilla.suse.com/1167532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10684"
},
{
"cve": "CVE-2020-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10685"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10685",
"url": "https://www.suse.com/security/cve/CVE-2020-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1167440 for CVE-2020-10685",
"url": "https://bugzilla.suse.com/1167440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10685"
},
{
"cve": "CVE-2020-10691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10691"
}
],
"notes": [
{
"category": "general",
"text": "An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10691",
"url": "https://www.suse.com/security/cve/CVE-2020-10691"
},
{
"category": "external",
"summary": "SUSE Bug 1167873 for CVE-2020-10691",
"url": "https://bugzilla.suse.com/1167873"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10691"
},
{
"cve": "CVE-2020-10729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10729"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10729",
"url": "https://www.suse.com/security/cve/CVE-2020-10729"
},
{
"category": "external",
"summary": "SUSE Bug 1171162 for CVE-2020-10729",
"url": "https://bugzilla.suse.com/1171162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10729"
},
{
"cve": "CVE-2020-14330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14330"
}
],
"notes": [
{
"category": "general",
"text": "An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14330",
"url": "https://www.suse.com/security/cve/CVE-2020-14330"
},
{
"category": "external",
"summary": "SUSE Bug 1174145 for CVE-2020-14330",
"url": "https://bugzilla.suse.com/1174145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14330"
},
{
"cve": "CVE-2020-14332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14332"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14332",
"url": "https://www.suse.com/security/cve/CVE-2020-14332"
},
{
"category": "external",
"summary": "SUSE Bug 1174302 for CVE-2020-14332",
"url": "https://bugzilla.suse.com/1174302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14332"
},
{
"cve": "CVE-2020-1733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1733"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 \u0026\u0026 mkdir -p \u003cdir\u003e\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating \u0027/proc/\u003cpid\u003e/cmdline\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1733",
"url": "https://www.suse.com/security/cve/CVE-2020-1733"
},
{
"category": "external",
"summary": "SUSE Bug 1164140 for CVE-2020-1733",
"url": "https://bugzilla.suse.com/1164140"
},
{
"category": "external",
"summary": "SUSE Bug 1171823 for CVE-2020-1733",
"url": "https://bugzilla.suse.com/1171823"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1733"
},
{
"cve": "CVE-2020-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1734",
"url": "https://www.suse.com/security/cve/CVE-2020-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1164139 for CVE-2020-1734",
"url": "https://bugzilla.suse.com/1164139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1734"
},
{
"cve": "CVE-2020-1735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1735",
"url": "https://www.suse.com/security/cve/CVE-2020-1735"
},
{
"category": "external",
"summary": "SUSE Bug 1164137 for CVE-2020-1735",
"url": "https://bugzilla.suse.com/1164137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1735"
},
{
"cve": "CVE-2020-1736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1736"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1736",
"url": "https://www.suse.com/security/cve/CVE-2020-1736"
},
{
"category": "external",
"summary": "SUSE Bug 1164134 for CVE-2020-1736",
"url": "https://bugzilla.suse.com/1164134"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-1736"
},
{
"cve": "CVE-2020-1737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1737"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1737",
"url": "https://www.suse.com/security/cve/CVE-2020-1737"
},
{
"category": "external",
"summary": "SUSE Bug 1164138 for CVE-2020-1737",
"url": "https://bugzilla.suse.com/1164138"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1737"
},
{
"cve": "CVE-2020-1738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1738"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when the module package or service is used and the parameter \u0027use\u0027 is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1738",
"url": "https://www.suse.com/security/cve/CVE-2020-1738"
},
{
"category": "external",
"summary": "SUSE Bug 1164136 for CVE-2020-1738",
"url": "https://bugzilla.suse.com/1164136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1738"
},
{
"cve": "CVE-2020-1739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1739"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1739",
"url": "https://www.suse.com/security/cve/CVE-2020-1739"
},
{
"category": "external",
"summary": "SUSE Bug 1164133 for CVE-2020-1739",
"url": "https://bugzilla.suse.com/1164133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1739"
},
{
"cve": "CVE-2020-1740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1740"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes \"ansible-vault edit\", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1740",
"url": "https://www.suse.com/security/cve/CVE-2020-1740"
},
{
"category": "external",
"summary": "SUSE Bug 1164135 for CVE-2020-1740",
"url": "https://bugzilla.suse.com/1164135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-1740"
},
{
"cve": "CVE-2020-1744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1744"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1744",
"url": "https://www.suse.com/security/cve/CVE-2020-1744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1744"
},
{
"cve": "CVE-2020-1746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1746"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1746",
"url": "https://www.suse.com/security/cve/CVE-2020-1746"
},
{
"category": "external",
"summary": "SUSE Bug 1165393 for CVE-2020-1746",
"url": "https://bugzilla.suse.com/1165393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1746"
},
{
"cve": "CVE-2020-1753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1753"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1753",
"url": "https://www.suse.com/security/cve/CVE-2020-1753"
},
{
"category": "external",
"summary": "SUSE Bug 1166389 for CVE-2020-1753",
"url": "https://bugzilla.suse.com/1166389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-1753"
},
{
"cve": "CVE-2021-20178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20178"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20178",
"url": "https://www.suse.com/security/cve/CVE-2021-20178"
},
{
"category": "external",
"summary": "SUSE Bug 1180816 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1180816"
},
{
"category": "external",
"summary": "SUSE Bug 1186493 for CVE-2021-20178",
"url": "https://bugzilla.suse.com/1186493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20178"
},
{
"cve": "CVE-2021-20180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20180"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20180",
"url": "https://www.suse.com/security/cve/CVE-2021-20180"
},
{
"category": "external",
"summary": "SUSE Bug 1180942 for CVE-2021-20180",
"url": "https://bugzilla.suse.com/1180942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20180"
},
{
"cve": "CVE-2021-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20191"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20191",
"url": "https://www.suse.com/security/cve/CVE-2021-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1181119 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181119"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20191",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20191"
},
{
"cve": "CVE-2021-20228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20228"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20228",
"url": "https://www.suse.com/security/cve/CVE-2021-20228"
},
{
"category": "external",
"summary": "SUSE Bug 1181935 for CVE-2021-20228",
"url": "https://bugzilla.suse.com/1181935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20228"
},
{
"cve": "CVE-2021-3583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3583"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Ansible, where a user\u0027s controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3583",
"url": "https://www.suse.com/security/cve/CVE-2021-3583"
},
{
"category": "external",
"summary": "SUSE Bug 1188061 for CVE-2021-3583",
"url": "https://bugzilla.suse.com/1188061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.aarch64",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.ppc64le",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.s390x",
"openSUSE Tumbleweed:ansible-9-9.8.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3583"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…