Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-doc" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-fireball" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-node-fireball" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.0.0.2-2", "binary_name": "ansible" }, { "binary_version": "2.0.0.2-2", "binary_name": "ansible-fireball" }, { "binary_version": "2.0.0.2-2", "binary_name": "ansible-node-fireball" } ] }