![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2017.0164 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2017-0164) |
Summary: | The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. |
Description: | Summary: The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2017-0164 advisory. Vulnerability Insight: It was found that apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key (CVE-2016-8614). It is reported that in Ansible, under some circumstances the mysql_user module may fail to correctly change a password. Thus an old password may still be active when it should have been changed (CVE-2016-8647). Data for lookup plugins used as variables was not being correctly marked as 'unsafe' (CVE-2017-7481). The ansible package has been updated to version 2.3.1 to fix these issues and several other bugs. Affected Software/OS: 'ansible' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-8614 BugTraq ID: 94108 http://www.securityfocus.com/bid/94108 Common Vulnerability Exposure (CVE) ID: CVE-2016-8647 RHSA-2017:1685 https://access.redhat.com/errata/RHSA-2017:1685 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647 https://github.com/ansible/ansible-modules-core/pull/5388 Common Vulnerability Exposure (CVE) ID: CVE-2017-7481 BugTraq ID: 98492 http://www.securityfocus.com/bid/98492 https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html RedHat Security Advisories: RHSA-2017:1244 https://access.redhat.com/errata/RHSA-2017:1244 RedHat Security Advisories: RHSA-2017:1334 https://access.redhat.com/errata/RHSA-2017:1334 RedHat Security Advisories: RHSA-2017:1476 https://access.redhat.com/errata/RHSA-2017:1476 RedHat Security Advisories: RHSA-2017:1499 https://access.redhat.com/errata/RHSA-2017:1499 RedHat Security Advisories: RHSA-2017:1599 https://access.redhat.com/errata/RHSA-2017:1599 RedHat Security Advisories: RHSA-2017:2524 https://access.redhat.com/errata/RHSA-2017:2524 https://usn.ubuntu.com/4072-1/ |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |