An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
This PR contains the following updates:
==8.2.0
->==8.5.0
GitHub Vulnerability Alerts
CVE-2023-5115
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
Release Notes
ansible-community/ansible-build-data (ansible)
### [`v8.3.0`](https://togithub.com/ansible-community/ansible-build-data/compare/8.2.0...8.3.0) [Compare Source](https://togithub.com/ansible-community/ansible-build-data/compare/8.2.0...8.3.0)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
â™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.