2024-12-12 21:07:30 +00:00

461 lines
26 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201490",
"Version": "oval:org.altlinux.errata:def:20201490",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1490: package `ansible` update to version 2.8.10-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1490",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1490",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02164",
"RefURL": "https://bdu.fstec.ru/vul/2020-02164",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02200",
"RefURL": "https://bdu.fstec.ru/vul/2020-02200",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02201",
"RefURL": "https://bdu.fstec.ru/vul/2020-02201",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03324",
"RefURL": "https://bdu.fstec.ru/vul/2020-03324",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05681",
"RefURL": "https://bdu.fstec.ru/vul/2020-05681",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05762",
"RefURL": "https://bdu.fstec.ru/vul/2020-05762",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05829",
"RefURL": "https://bdu.fstec.ru/vul/2020-05829",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03714",
"RefURL": "https://bdu.fstec.ru/vul/2021-03714",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00266",
"RefURL": "https://bdu.fstec.ru/vul/2022-00266",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00282",
"RefURL": "https://bdu.fstec.ru/vul/2022-00282",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00284",
"RefURL": "https://bdu.fstec.ru/vul/2022-00284",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03971",
"RefURL": "https://bdu.fstec.ru/vul/2022-03971",
"Source": "BDU"
},
{
"RefID": "CVE-2018-16859",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16859",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10206",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14846",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14856",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14856",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14858",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14864",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14864",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14904",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14904",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14905",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14905",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10684",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1733",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739",
"Source": "CVE"
}
],
"Description": "This update upgrades ansible to version 2.8.10-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02164: Уязвимость системы управления конфигурациями Ansible, связана с раскрытием информации через регистрационные файлы, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-02200: Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-02201: Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03324: Уязвимость модулей Splunk и Sumologic системы управления конфигурациями Ansible, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05681: Уязвимость модуля win_unzip системы управления конфигурациями Ansible, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-05762: Уязвимость системы управления конфигурациями Ansible, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде ОС, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2020-05829: Уязвимость системы управления конфигурациями Ansible, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2021-03714: Уязвимость модуля solaris_zone системы управления конфигурациями Ansible, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00266: Уязвимость системы управления конфигурациями ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-00282: Уязвимость системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00284: Уязвимость модуля svn системы управления конфигурациями Ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-03971: Уязвимость модуля nxos_file_copy системы управления конфигурациями Ansible, позволяющая нарушителю выполнить произвольные команды\n\n * CVE-2018-16859: Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.\n\n * CVE-2019-10156: A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.\n\n * CVE-2019-10206: ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.\n\n * CVE-2019-14846: In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.\n\n * CVE-2019-14856: ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None\n\n * CVE-2019-14858: A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.\n\n * CVE-2019-14864: Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.\n\n * CVE-2019-14904: A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.\n\n * CVE-2019-14905: A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.\n\n * CVE-2020-10684: A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.\n\n * CVE-2020-1733: A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with \"umask 77 \u0026\u0026 mkdir -p \u003cdir\u003e\"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/\u003cpid\u003e/cmdline'.\n\n * CVE-2020-1734: A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.\n\n * CVE-2020-1737: A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.\n\n * CVE-2020-1738: A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.\n\n * CVE-2020-1739: A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.\n\n * #36899: New version",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-03-16"
},
"Updated": {
"Date": "2020-03-16"
},
"BDUs": [
{
"ID": "BDU:2020-02164",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-117, CWE-532",
"Href": "https://bdu.fstec.ru/vul/2020-02164",
"Impact": "Low",
"Public": "20191011"
},
{
"ID": "BDU:2020-02200",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-02200",
"Impact": "Low",
"Public": "20200310"
},
{
"ID": "BDU:2020-02201",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-02201",
"Impact": "Low",
"Public": "20190723"
},
{
"ID": "BDU:2020-03324",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-117, CWE-532",
"Href": "https://bdu.fstec.ru/vul/2020-03324",
"Impact": "Low",
"Public": "20200102"
},
{
"ID": "BDU:2020-05681",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2020-05681",
"Impact": "High",
"Public": "20200309"
},
{
"ID": "BDU:2020-05762",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"CWE": "CWE-78",
"Href": "https://bdu.fstec.ru/vul/2020-05762",
"Impact": "High",
"Public": "20200303"
},
{
"ID": "BDU:2020-05829",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CWE": "CWE-94, CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-05829",
"Impact": "Low",
"Public": "20200324"
},
{
"ID": "BDU:2021-03714",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L",
"CWE": "CWE-78",
"Href": "https://bdu.fstec.ru/vul/2021-03714",
"Impact": "High",
"Public": "20200826"
},
{
"ID": "BDU:2022-00266",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-00266",
"Impact": "Low",
"Public": "20190606"
},
{
"ID": "BDU:2022-00282",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"CWE": "CWE-377",
"Href": "https://bdu.fstec.ru/vul/2022-00282",
"Impact": "Low",
"Public": "20200311"
},
{
"ID": "BDU:2022-00284",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-00284",
"Impact": "Low",
"Public": "20200312"
},
{
"ID": "BDU:2022-03971",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"CWE": "CWE-20, CWE-73",
"Href": "https://bdu.fstec.ru/vul/2022-03971",
"Impact": "Low",
"Public": "20200331"
}
],
"CVEs": [
{
"ID": "CVE-2018-16859",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16859",
"Impact": "Low",
"Public": "20181129"
},
{
"ID": "CVE-2019-10156",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
"Impact": "Low",
"Public": "20190730"
},
{
"ID": "CVE-2019-10206",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-522",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
"Impact": "Low",
"Public": "20191122"
},
{
"ID": "CVE-2019-14846",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14846",
"Impact": "High",
"Public": "20191008"
},
{
"ID": "CVE-2019-14856",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14856",
"Impact": "Low",
"Public": "20191126"
},
{
"ID": "CVE-2019-14858",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
"Impact": "Low",
"Public": "20191014"
},
{
"ID": "CVE-2019-14864",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14864",
"Impact": "Low",
"Public": "20200102"
},
{
"ID": "CVE-2019-14904",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14904",
"Impact": "High",
"Public": "20200826"
},
{
"ID": "CVE-2019-14905",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14905",
"Impact": "Low",
"Public": "20200331"
},
{
"ID": "CVE-2020-10684",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10684",
"Impact": "High",
"Public": "20200324"
},
{
"ID": "CVE-2020-1733",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1733",
"Impact": "Low",
"Public": "20200311"
},
{
"ID": "CVE-2020-1734",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1734",
"Impact": "High",
"Public": "20200303"
},
{
"ID": "CVE-2020-1737",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1737",
"Impact": "High",
"Public": "20200309"
},
{
"ID": "CVE-2020-1738",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L",
"CWE": "CWE-88",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1738",
"Impact": "Low",
"Public": "20200316"
},
{
"ID": "CVE-2020-1739",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1739",
"Impact": "Low",
"Public": "20200312"
}
],
"Bugzilla": [
{
"ID": "36899",
"Href": "https://bugzilla.altlinux.org/36899",
"Data": "New version"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201490001",
"Comment": "ansible is earlier than 0:2.8.10-alt1"
}
]
}
]
}
}
]
}