![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2017.0164 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2017-0164) |
Zusammenfassung: | The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. Vulnerability Insight: It was found that apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key (CVE-2016-8614). It is reported that in Ansible, under some circumstances the mysql_user module may fail to correctly change a password. Thus an old password may still be active when it should have been changed (CVE-2016-8647). Data for lookup plugins used as variables was not being correctly marked as 'unsafe' (CVE-2017-7481). The ansible package has been updated to version 2.3.1 to fix these issues and several other bugs. Affected Software/OS: 'ansible' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-8614 BugTraq ID: 94108 http://www.securityfocus.com/bid/94108 Common Vulnerability Exposure (CVE) ID: CVE-2016-8647 RHSA-2017:1685 https://access.redhat.com/errata/RHSA-2017:1685 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647 https://github.com/ansible/ansible-modules-core/pull/5388 Common Vulnerability Exposure (CVE) ID: CVE-2017-7481 BugTraq ID: 98492 http://www.securityfocus.com/bid/98492 https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html RedHat Security Advisories: RHSA-2017:1244 https://access.redhat.com/errata/RHSA-2017:1244 RedHat Security Advisories: RHSA-2017:1334 https://access.redhat.com/errata/RHSA-2017:1334 RedHat Security Advisories: RHSA-2017:1476 https://access.redhat.com/errata/RHSA-2017:1476 RedHat Security Advisories: RHSA-2017:1499 https://access.redhat.com/errata/RHSA-2017:1499 RedHat Security Advisories: RHSA-2017:1599 https://access.redhat.com/errata/RHSA-2017:1599 RedHat Security Advisories: RHSA-2017:2524 https://access.redhat.com/errata/RHSA-2017:2524 https://usn.ubuntu.com/4072-1/ |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |