ansible-core@2.16.4rc1 vulnerabilities
Radically simple IT automation
-
latest version
2.18.0
-
first published
4 years ago
-
latest version published
5 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the ansible-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
ansible-core is an a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. Affected versions of this package are vulnerable to Incorrect Authorization through the Note: This is only exploitable if someone with root privileges uses the How to fix Incorrect Authorization? Upgrade |
[,2.14.18rc1)
[2.15.0b1,2.15.13rc1)
[2.16.0b1,2.16.13rc1)
[2.17.0b1,2.17.6rc1)
[2.18.0b1,2.18.0rc2)
|
ansible-core is an a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. Affected versions of this package are vulnerable to Exposure of Sensitive Information in Log Files when loading variables from Ansible Vault without setting Note: This is a similar vulnerability to the previously reported CVE-2024-0690. How to fix Exposure of Sensitive Information in Log Files? There is no fixed version for |
[0,)
|