![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2019.0309 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2019-0309) |
Zusammenfassung: | The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2019-0309 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2019-0309 advisory. Vulnerability Insight: Updated ansible package fixes security vulnerabilities: ansible-playbook -k and ansible cli tools prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them (CVE-2019-10206). Ansible was logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process (CVE-2019-14846). When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task (CVE-2019-14858). Affected Software/OS: 'ansible' package(s) on Mageia 7. Solution: Please install the updated package(s). CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-10206 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206 Debian Security Information: DSA-4950 (Google Search) https://www.debian.org/security/2021/dsa-4950 https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html SuSE Security Announcement: openSUSE-SU-2020:0513 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html SuSE Security Announcement: openSUSE-SU-2020:0523 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html Common Vulnerability Exposure (CVE) ID: CVE-2019-14846 https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html RedHat Security Advisories: RHSA-2019:3201 https://access.redhat.com/errata/RHSA-2019:3201 RedHat Security Advisories: RHSA-2019:3202 https://access.redhat.com/errata/RHSA-2019:3202 RedHat Security Advisories: RHSA-2019:3203 https://access.redhat.com/errata/RHSA-2019:3203 RedHat Security Advisories: RHSA-2019:3207 https://access.redhat.com/errata/RHSA-2019:3207 RedHat Security Advisories: RHSA-2020:0756 https://access.redhat.com/errata/RHSA-2020:0756 Common Vulnerability Exposure (CVE) ID: CVE-2019-14858 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |