QID 239273

Date Published: 2021-05-10

QID 239273: Red Hat Update for Ansible (RHSA-2021:1343)

Ansible is a simple model-driven configuration management, multi-nodedeployment, and remote-task execution system. Ansible works over SSH anddoes not require any software or daemons to be installed on remote nodes.Extension modules can be written in any language and are transferred tomanaged machines automatically.The following packages have been upgraded to a newer upstream version:ansible (2.9.20)Bug Fix(es): CVE-2021-3447 ansible: multiple modules expose secured values See:https://github.com/ansible/ansible/blob/v2.9.20/changelogs/CHANGELOG-v2.9.rst for details on bug fixes in this release. Solution For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258 Affected Products Red Hat Ansible Engine 2.9 for RHEL 8 x86_64 Red Hat Ansible Engine 2.9 for RHEL 8 s390x Red Hat Ansible Engine 2.9 for RHEL 8 ppc64le Red Hat Ansible Engine 2.9 for RHEL 8 aarch64 Red Hat Ansible Engine 2.9 for RHEL 7 x86_64 Red Hat Ansible Engine 2.9 for RHEL 7 s390x Red Hat Ansible Engine 2.9 for RHEL 7 ppc64le Fixes BZ - 1939349 - CVE-2021-3447 ansible: multiple modules expose secured values CVEs CVE-2021-3447 References https://access.redhat.com/security/updates/classification/#moderate Note: More recent versions of these packages may be available. Click a package name

Affected Products:

Red Hat Ansible Engine 2.9 for RHEL 8 x86_64
Red Hat Ansible Engine 2.9 for RHEL 8 s390x
Red Hat Ansible Engine 2.9 for RHEL 8 ppc64le
Red Hat Ansible Engine 2.9 for RHEL 8 aarch64
Red Hat Ansible Engine 2.9 for RHEL 7 x86_64
Red Hat Ansible Engine 2.9 for RHEL 7 s390x
Red Hat Ansible Engine 2.9 for RHEL 7 ppc64le

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as Medium - 5.5 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1343 to address this issue and obtain more information.

    Vendor References

    CVEs related to QID 239273

    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:1343 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2021:1343?language=en