6.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:C/A:C
7.9 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.8%
Debian Security Advisory DSA-4950-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
August 07, 2021 https://www.debian.org/security/faq
Package : ansible
CVE ID : CVE-2019-10156 CVE-2019-10206 CVE-2019-14846 CVE-2019-14864
CVE-2019-14904 CVE-2020-1733 CVE-2020-1735 CVE-2020-1739
CVE-2020-1740 CVE-2020-1746 CVE-2020-1753 CVE-2020-10684
CVE-2020-10685 CVE-2020-10729 CVE-2020-14330 CVE-2020-14332
CVE-2020-14365 CVE-2021-20228
Several vulnerabilities have been found in Ansible, a configuration
management, deployment and task execution system, which could result in
information disclosure or argument injection. In addition a race
condition in become_user was fixed.
For the stable distribution (buster), these problems have been fixed in
version 2.7.7+dfsg-1+deb10u1.
We recommend that you upgrade your ansible packages.
For the detailed security status of ansible please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ansible
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | ansible-doc | < 2.7.7+dfsg-1+deb10u1 | ansible-doc_2.7.7+dfsg-1+deb10u1_all.deb |
Debian | 10 | all | ansible | < 2.7.7+dfsg-1+deb10u1 | ansible_2.7.7+dfsg-1+deb10u1_all.deb |
6.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:C/A:C
7.9 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.8%