Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- One of my favorite byproducts of automation: the active discussion re: security and productivity. Automated installations can suddenly fail because new packages are called out with outstanding CVEs when changing OS versions. Updating metadata is much easier than updating precompiled packages.
- module.bastion.google_compute_instance.bastion: Provisioning with 'remote-exec'...
- module.bastion.google_compute_instance.bastion (remote-exec): Connecting to remote host via SSH...
- module.bastion.google_compute_instance.bastion (remote-exec): Host: 1.5.4.82
- module.bastion.google_compute_instance.bastion (remote-exec): User: joe
- module.bastion.google_compute_instance.bastion (remote-exec): Password: false
- module.bastion.google_compute_instance.bastion (remote-exec): Private key: true
- module.bastion.google_compute_instance.bastion (remote-exec): SSH Agent: false
- module.bastion.google_compute_instance.bastion (remote-exec): Connected!
- module.bastion.google_compute_instance.bastion (remote-exec): Fetching vuln.xml.bz2: 0%
- module.bastion.google_compute_instance.bastion (remote-exec): Fetching vuln.xml.bz2: 100% 638 KiB 653.5kB/s 00:01
- module.bastion.google_compute_instance.bastion (remote-exec): python27-2.7.11_1 is vulnerable:
- module.bastion.google_compute_instance.bastion (remote-exec): Python -- Integer overflow in zipimport module
- module.bastion.google_compute_instance.bastion (remote-exec): CVE: CVE-2016-5636
- module.bastion.google_compute_instance.bastion (remote-exec): WWW: https://vuxml.FreeBSD.org/freebsd/1d0f6852-33d8-11e6-a671-60a44ce6887b.html
- module.bastion.google_compute_instance.bastion (remote-exec): python27-2.7.11_1 is vulnerable:
- module.bastion.google_compute_instance.bastion (remote-exec): Python -- smtplib StartTLS stripping vulnerability
- module.bastion.google_compute_instance.bastion (remote-exec): CVE: CVE-2016-0772
- module.bastion.google_compute_instance.bastion (remote-exec): WWW: https://vuxml.FreeBSD.org/freebsd/8d5368ef-40fe-11e6-b2ec-b499baebfeaf.html
- module.bastion.google_compute_instance.bastion (remote-exec): curl-7.47.0 is vulnerable:
- module.bastion.google_compute_instance.bastion (remote-exec): Vulnerabilities in Curl
- module.bastion.google_compute_instance.bastion (remote-exec): CVE: CVE-2016-5421
- module.bastion.google_compute_instance.bastion (remote-exec): CVE: CVE-2016-5420
- module.bastion.google_compute_instance.bastion (remote-exec): CVE: CVE-2016-5419
- module.bastion.google_compute_instance.bastion (remote-exec): WWW: https://vuxml.FreeBSD.org/freebsd/e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1.html
- module.bastion.google_compute_instance.bastion (remote-exec): 2 problem(s) in the installed packages found.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement