{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: improper verification of key fingerprints in apt_key module\n     - debian/patches/CVE-2016-8614.patch: fix use of long key IDs for delete,\n       check for key_id presence and fix key_id length for verification. Fix\n       reversed order of return values in parse_key_id function\n     - CVE-2016-8614",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2025/clsa-2025_1744116044.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744116044",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744116044"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-19T15:19:06Z",
      "generator": {
        "date": "2025-05-19T15:19:06Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1744116044",
      "initial_release_date": "2025-04-08T12:40:47Z",
      "revision_history": [
        {
          "date": "2025-04-08T12:40:47Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-05-19T15:19:06Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Fix CVE(s): CVE-2016-8614"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all",
                "product": {
                  "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all",
                  "product_id": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/ansible@2.1.1.0-1~ubuntu16.04.1%2Btuxcare.els1?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all"
        },
        "product_reference": "ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-8614",
      "cwe": {
        "id": "CWE-358",
        "name": "Improperly Implemented Security Check for Standard"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2016-8614"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/94108",
          "url": "http://www.securityfocus.com/bid/94108"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8614",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8614"
        },
        {
          "category": "external",
          "summary": "https://github.com/ansible/ansible-modules-core/issues/5237",
          "url": "https://github.com/ansible/ansible-modules-core/issues/5237"
        },
        {
          "category": "external",
          "summary": "https://github.com/ansible/ansible-modules-core/pull/5353",
          "url": "https://github.com/ansible/ansible-modules-core/pull/5353"
        },
        {
          "category": "external",
          "summary": "https://github.com/ansible/ansible-modules-core/pull/5357",
          "url": "https://github.com/ansible/ansible-modules-core/pull/5357"
        }
      ],
      "release_date": "2018-07-31T21:29:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK_ACCESSIBLE",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:ansible-0:2.1.1.0-1~ubuntu16.04.1+tuxcare.els1.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}