183 lines
8.4 KiB
JSON
183 lines
8.4 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20202341",
|
||
"Version": "oval:org.altlinux.errata:def:20202341",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-2341: package `ansible` update to version 2.9.10-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit",
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-2341",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2341",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02201",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02201",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-10156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-10206",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-14858",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10691",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10691",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10744",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ansible to version 2.9.10-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02201: Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00266: Уязвимость системы управления конфигурациями ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * CVE-2019-10156: A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.\n\n * CVE-2019-10206: ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.\n\n * CVE-2019-14858: A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.\n\n * CVE-2020-10691: An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.\n\n * CVE-2020-10744: An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Low",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-07-09"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-07-09"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2020-02201",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02201",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00266",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00266",
|
||
"Impact": "Low",
|
||
"Public": "20190606"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-10156",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10156",
|
||
"Impact": "Low",
|
||
"Public": "20190730"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-10206",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-522",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10206",
|
||
"Impact": "Low",
|
||
"Public": "20191122"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-14858",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-532",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14858",
|
||
"Impact": "Low",
|
||
"Public": "20191014"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10691",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
|
||
"CWE": "CWE-22",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10691",
|
||
"Impact": "Low",
|
||
"Public": "20200430"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10744",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10744",
|
||
"Impact": "Low",
|
||
"Public": "20200515"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:container:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202341001",
|
||
"Comment": "ansible is earlier than 0:2.9.10-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |