7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
62.7%
An update that fixes four vulnerabilities is now available.
Description:
This update for ansible fixes the following issues:
Ansible was updated to version 2.8.1:
Full changelog is at /usr/share/doc/packages/ansible/changelogs/
Bugfixes
--playbook-dir
to adjacentsource_auth
set to credential_file
.tasks:
block.dev
as ‘newest version’oom_killer
and oom_score_adj
options arenetworks_cli_compatible
is enabled.restart
instead ofstop
/start
to restart a container.build
was not specified, the wrong default forbuild.rm
is used.nocache
set to yes
but notbuild.nocache
, the module failed.source: build
was set butbuild.path
options not specified.aux_addresses
ipam_config
.listen
as a valid keywordcryptography
backend.:
and rely on already parsed hostname and port valuesupdate_cache
standaloneUpdate to version 2.8.0
Major changes:
* Experimental support for Ansible Collections and content namespacing -
Ansible content can now be packaged in a collection and addressed via
namespaces. This allows for easier sharing, distribution, and
installation
of bundled modules/roles/plugins, and consistent rules for accessing
specific content via namespaces.
* Python interpreter discovery - The first time a Python module runs on
a target, Ansible will attempt to discover the proper default Python
interpreter to use for the target platform/version (instead of
immediately defaulting to /usr/bin/python). You can override this
behavior by setting ansible_python_interpreter or via config. (see
https://github.com/ansible/ansible/pull/50163)
* become - The deprecated CLI arguments for --sudo, --sudo-user,
--ask-sudo-pass, -su, --su-user, and --ask-su-pass have been removed,
in favor of the more generic --become, --become-user,
--become-method, and
--ask-become-pass.
* become - become functionality has been migrated to a plugin
architecture, to allow customization of become functionality and 3rd
party become methods (https://github.com/ansible/ansible/pull/50991)
For the full changelog see /usr/share/doc/packages/ansible/changelogs or
online:
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.
8.rst
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1635=1
openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-1635=1
openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1635=1
openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-1635=1
SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2019-1635=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Leap | 42.3 | noarch | < - openSUSE Leap 42.3 (noarch): | - openSUSE Leap 42.3 (noarch):.noarch.rpm | |
openSUSE Leap | 15.1 | noarch | < - openSUSE Leap 15.1 (noarch): | - openSUSE Leap 15.1 (noarch):.noarch.rpm | |
openSUSE Leap | 15.0 | noarch | < - openSUSE Leap 15.0 (noarch): | - openSUSE Leap 15.0 (noarch):.noarch.rpm | |
openSUSE Backports SLE | 15 | noarch | < openSUSE Backports SLE-15 (noarch): | - openSUSE Backports SLE-15 (noarch):.noarch.rpm | |
SUSE Package Hub for SUSE Linux Enterprise | 12 | noarch | < - SUSE Package Hub for SUSE Linux Enterprise 12 (noarch): | - SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):.noarch.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
62.7%