PyPi: Ansible-Doctor

CVE-2024-11079

Transitive

Safety vulnerability ID: 74509

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 12, 2024 Updated at Apr 01, 2025
Scan your Python projects for vulnerabilities →

Advisory

Ansible-doctor has updated its dependency on ansible-core to version 2.16.14 to address the security vulnerability tracked as CVE-2024-11079.

Affected package

ansible-doctor

Latest version: 7.0.4

Generate documentation from annotated Ansible roles using templates.

Affected versions

Fixed versions

Vulnerability changelog

Bug Fixes

- **deps:** update dependency ansible-core to v2.16.14 [security] (815) (4b77289)

Others

- **deps:** lock file maintenance (812) (5ba5653)
- **deps:** update quay.io/thegeeklab/hugo docker tag to v0.139 (818) (5d76423)
- **docker:** update python:3.13-alpine docker digest to 40241d5 (819) (24dc277)
- **deps:** update dependency ruff to v0.8.2 (817) (e5b5c4c)
- **docker:** update python:3.13-alpine docker digest to 804ad02 (816) (86e6f5b)
- **deps:** update devdeps non-major (814) (a5b923e)
- **deps:** update dependency ruff to v0.8.0 (813) (e70429f)
- **deps:** update dependency ruff to v0.7.4 (811) (daaa15c)
- **deps:** update quay.io/thegeeklab/wp-docker-buildx docker tag to v6 (809) (c61b7ed)
- **docker:** update python:3.13-alpine docker digest to fcbcbbe (808) (c2093cd)
- **docker:** update python:3.13-alpine docker digest to ee60f1f (807) (62f9e10)
- **deps:** update dependency ruff to v0.7.3 (806) (de05256)

CI Pipeline

- only pin to hugo patch release (31b14cc)
- add read-only pull secret to security build (9bae845)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.5

CVSS v3 Details

MEDIUM 5.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
LOW
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
LOW