CVSS Base Vector:
The remote host is missing an update for the 'ansible'
Linux Distribution Package(s) announced via the DSA-1923-1 advisory.
Checks if a vulnerable Linux Distribution Package version is present on the target host.
Several vulnerabilities were discovered in Ansible, a configuration
management, deployment, and task execution system.
A potential man-in-the-middle attack associated with insusfficient
X.509 certificate verification. Ansible did not verify that the
server hostname matches a domain name in the subject's Common Name
(CN) or subjectAltName field of the X.509 certificate, which allows
man-in-the-middle attackers to spoof SSL servers via an arbitrary
A symlink attack that allows local users to escape a restricted
environment (chroot or jail) via a symlink attack.
A fix potential arbitrary code execution resulting from reading
ansible.cfg from a world-writable current working directory. This
condition now causes ansible to emit a warning and ignore the
ansible.cfg in the world-writable current working directory.
Information disclosure through unexpected variable substitution.
'ansible' Linux Distribution Package(s) on Debian Linux.
For Debian 8 'Jessie', these problems have been fixed in version
We recommend that you upgrade your ansible Linux Distribution Packages.
Linux Distribution Package
Debian Local Security Checks
Find and Fix this Vulnerability:
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
NVD CVE ID: