![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2019.0309 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2019-0309) |
Summary: | The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2019-0309 advisory. |
Description: | Summary: The remote host is missing an update for the 'ansible' package(s) announced via the MGASA-2019-0309 advisory. Vulnerability Insight: Updated ansible package fixes security vulnerabilities: ansible-playbook -k and ansible cli tools prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them (CVE-2019-10206). Ansible was logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process (CVE-2019-14846). When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task (CVE-2019-14858). Affected Software/OS: 'ansible' package(s) on Mageia 7. Solution: Please install the updated package(s). CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-10206 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206 Debian Security Information: DSA-4950 (Google Search) https://www.debian.org/security/2021/dsa-4950 https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html SuSE Security Announcement: openSUSE-SU-2020:0513 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html SuSE Security Announcement: openSUSE-SU-2020:0523 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html Common Vulnerability Exposure (CVE) ID: CVE-2019-14846 https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html RedHat Security Advisories: RHSA-2019:3201 https://access.redhat.com/errata/RHSA-2019:3201 RedHat Security Advisories: RHSA-2019:3202 https://access.redhat.com/errata/RHSA-2019:3202 RedHat Security Advisories: RHSA-2019:3203 https://access.redhat.com/errata/RHSA-2019:3203 RedHat Security Advisories: RHSA-2019:3207 https://access.redhat.com/errata/RHSA-2019:3207 RedHat Security Advisories: RHSA-2020:0756 https://access.redhat.com/errata/RHSA-2020:0756 Common Vulnerability Exposure (CVE) ID: CVE-2019-14858 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |