ALT-PU-2015-1582-1
Closed vulnerabilities
Published: 2015-08-12
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-3908
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Severity: MEDIUM (4.3)
References:
- openSUSE-SU-2015:1280
- openSUSE-SU-2015:1280
- openSUSE-SU-2015:1452
- openSUSE-SU-2015:1452
- http://www.ansible.com/security
- http://www.ansible.com/security
- [oss-security] 20150714 [CVE-2015-3908] Improper TLS Certificate Validation in Ansible
- [oss-security] 20150714 [CVE-2015-3908] Improper TLS Certificate Validation in Ansible
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
Published: 2017-06-07
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-6240
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
Severity: HIGH (7.8)
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- [oss-security] 20150817 Re: CVE request: ansible zone/chroot/jail escape
- [oss-security] 20150817 Re: CVE request: ansible zone/chroot/jail escape
- https://bugzilla.redhat.com/show_bug.cgi?id=1243468
- https://bugzilla.redhat.com/show_bug.cgi?id=1243468
- https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647
- https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647
- https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b
- https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
Closed bugs
Обновить версию