|Category:||Debian Local Security Checks|
|Title:||Debian LTS Advisory ([SECURITY] [DLA 1576-1] ansible security update)|
|Summary:||It was discovered that there was a potential SSH passphrase disclosure;vulnerability in the ansible configuration management system,;;The 'User' module leaked data that was passed as a parameter to the;ssh-keygen(1) utility, thus revealing any credentials in cleartext form;in the global process list.|
It was discovered that there was a potential SSH passphrase disclosure
vulnerability in the ansible configuration management system,
The 'User' module leaked data that was passed as a parameter to the
ssh-keygen(1) utility, thus revealing any credentials in cleartext form
in the global process list.
Ansible is a radically simple model-driven configuration management,
multi-node deployment, and remote task execution system. Ansible works
over SSH and does not require any software or daemons to be installed
on remote nodes. Extension modules can be written in any language and
are transferred to managed machines automatically.
ansible on Debian Linux
For Debian 8 'Jessie', this issue has been fixed in ansible version
We recommend that you upgrade your ansible packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-16837|
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.