vuln-list-alt/oval/p11/ALT-PU-2019-2615/definitions.json
2024-12-12 21:07:30 +00:00

188 lines
8.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192615",
"Version": "oval:org.altlinux.errata:def:20192615",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2615: package `ansible` update to version 2.8.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2615",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2615",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02201",
"RefURL": "https://bdu.fstec.ru/vul/2020-02201",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05762",
"RefURL": "https://bdu.fstec.ru/vul/2020-05762",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00266",
"RefURL": "https://bdu.fstec.ru/vul/2022-00266",
"Source": "BDU"
},
{
"RefID": "CVE-2018-16859",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16859",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10206",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14858",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"Source": "CVE"
}
],
"Description": "This update upgrades ansible to version 2.8.4-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02201: Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05762: Уязвимость системы управления конфигурациями Ansible, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде ОС, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2022-00266: Уязвимость системы управления конфигурациями ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * CVE-2018-16859: Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.\n\n * CVE-2019-10156: A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.\n\n * CVE-2019-10206: ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.\n\n * CVE-2019-14858: A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.\n\n * CVE-2020-1734: A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.\n\n * #36899: New version",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-09-03"
},
"Updated": {
"Date": "2019-09-03"
},
"BDUs": [
{
"ID": "BDU:2020-02201",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-02201",
"Impact": "Low",
"Public": "20190723"
},
{
"ID": "BDU:2020-05762",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"CWE": "CWE-78",
"Href": "https://bdu.fstec.ru/vul/2020-05762",
"Impact": "High",
"Public": "20200303"
},
{
"ID": "BDU:2022-00266",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-00266",
"Impact": "Low",
"Public": "20190606"
}
],
"CVEs": [
{
"ID": "CVE-2018-16859",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16859",
"Impact": "Low",
"Public": "20181129"
},
{
"ID": "CVE-2019-10156",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
"Impact": "Low",
"Public": "20190730"
},
{
"ID": "CVE-2019-10206",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-522",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
"Impact": "Low",
"Public": "20191122"
},
{
"ID": "CVE-2019-14858",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
"Impact": "Low",
"Public": "20191014"
},
{
"ID": "CVE-2020-1734",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"Impact": "High",
"Public": "20200303"
}
],
"Bugzilla": [
{
"ID": "36899",
"Href": "https://bugzilla.altlinux.org/36899",
"Data": "New version"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192615001",
"Comment": "ansible is earlier than 0:2.8.4-alt1"
}
]
}
]
}
}
]
}