Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ansible-core@2.14.18-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/ansible-core@2.14.18-0%2Bdeb12u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (8)
Vulnerability Summary Aliases
VCID-1wv8-rvwu-nye3 ansible-core Incorrect Authorization vulnerability A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. CVE-2024-9902
GHSA-32p4-gm2c-wmch
VCID-4pht-n5pc-f3gw Ansible vulnerable to Insertion of Sensitive Information into Log File A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions. CVE-2024-8775
GHSA-jpxc-vmjf-9fcj
VCID-682j-e2pu-1uee Improper Neutralization of Special Elements Used in a Template Engine A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce code injection when supplying templating data. CVE-2023-5764
GHSA-7j69-qfc3-2fq9
VCID-axc3-wcsk-q3eg A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity. CVE-2021-3583
GHSA-2pfh-q76x-gwvm
PYSEC-2021-358
VCID-g2pj-dmae-e3er An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values. CVE-2024-0690
GHSA-h24r-m9qc-pvpg
PYSEC-2024-36
VCID-geaa-6dxx-tbcw A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality. CVE-2021-3620
GHSA-4r65-35qq-ch8j
PYSEC-2022-164
VCID-ujbp-cc1r-wfe9 Ansible symlink attack vulnerability An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path. CVE-2023-5115
GHSA-jpvw-p8pr-9g2x
VCID-v6rk-y6ws-dkh9 Ansible-Core vulnerable to content protections bypass A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks. CVE-2024-11079
GHSA-99w6-3xph-cx78

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:09:53.410526+00:00 Debian Importer Fixing VCID-1wv8-rvwu-nye3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:15.456156+00:00 Debian Importer Fixing VCID-ujbp-cc1r-wfe9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:27.373311+00:00 Debian Importer Fixing VCID-682j-e2pu-1uee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:01.985588+00:00 Debian Importer Fixing VCID-axc3-wcsk-q3eg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:06.612975+00:00 Debian Importer Fixing VCID-g2pj-dmae-e3er https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:29.677541+00:00 Debian Importer Fixing VCID-geaa-6dxx-tbcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:18.063320+00:00 Debian Importer Fixing VCID-v6rk-y6ws-dkh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:26.843584+00:00 Debian Importer Fixing VCID-4pht-n5pc-f3gw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:03:24.983905+00:00 Debian Importer Fixing VCID-1wv8-rvwu-nye3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:22.137116+00:00 Debian Importer Fixing VCID-ujbp-cc1r-wfe9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:24.989787+00:00 Debian Importer Fixing VCID-682j-e2pu-1uee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:02.777649+00:00 Debian Importer Fixing VCID-axc3-wcsk-q3eg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:52.561029+00:00 Debian Importer Fixing VCID-g2pj-dmae-e3er https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:09.520224+00:00 Debian Importer Fixing VCID-geaa-6dxx-tbcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:56.810952+00:00 Debian Importer Fixing VCID-v6rk-y6ws-dkh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:40.928838+00:00 Debian Importer Fixing VCID-4pht-n5pc-f3gw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:17:34.638315+00:00 Debian Importer Fixing VCID-1wv8-rvwu-nye3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:17.404037+00:00 Debian Importer Fixing VCID-ujbp-cc1r-wfe9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.656661+00:00 Debian Importer Fixing VCID-682j-e2pu-1uee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:34.836296+00:00 Debian Importer Fixing VCID-axc3-wcsk-q3eg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:25.372758+00:00 Debian Importer Fixing VCID-g2pj-dmae-e3er https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:59.022637+00:00 Debian Importer Fixing VCID-geaa-6dxx-tbcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:08.144979+00:00 Debian Importer Fixing VCID-v6rk-y6ws-dkh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:29.372068+00:00 Debian Importer Fixing VCID-4pht-n5pc-f3gw https://security-tracker.debian.org/tracker/data/json 38.1.0