Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
{ "binaries": [ { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-doc" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-fireball" }, { "binary_version": "1.5.4+dfsg-1", "binary_name": "ansible-node-fireball" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.0.0.2-2", "binary_name": "ansible" }, { "binary_version": "2.0.0.2-2", "binary_name": "ansible-fireball" }, { "binary_version": "2.0.0.2-2", "binary_name": "ansible-node-fireball" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }