what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2021-1343-01

Red Hat Security Advisory 2021-1343-01
Posted Apr 23, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1343-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2021-3447
SHA-256 | 12d754c66a3442b65d2c7fbe80fa2a7b6ea9d831b2555bbdc5c5ec3bf7000b9b

Red Hat Security Advisory 2021-1343-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Ansible security update (2.9.20)
Advisory ID: RHSA-2021:1343-01
Product: Red Hat Ansible Engine
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1343
Issue date: 2021-04-22
CVE Names: CVE-2021-3447
=====================================================================

1. Summary:

An update for ansible is now available for Ansible Engine 2.9

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ansible Engine 2.9 for RHEL 7 Server - noarch
Red Hat Ansible Engine 2.9 for RHEL 8 - noarch

3. Description:

Ansible is a simple model-driven configuration management, multi-node
deployment, and remote-task execution system. Ansible works over SSH and
does not require any software or daemons to be installed on remote nodes.
Extension modules can be written in any language and are transferred to
managed machines automatically.

The following packages have been upgraded to a newer upstream version:
ansible (2.9.20)

Bug Fix(es):
* CVE-2021-3447 ansible: multiple modules expose secured values

See:
https://github.com/ansible/ansible/blob/v2.9.20/changelogs/CHANGELOG-v2.9.r
st
for details on bug fixes in this release.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1939349 - CVE-2021-3447 ansible: multiple modules expose secured values

6. Package List:

Red Hat Ansible Engine 2.9 for RHEL 7 Server:

Source:
ansible-2.9.20-1.el7ae.src.rpm

noarch:
ansible-2.9.20-1.el7ae.noarch.rpm
ansible-test-2.9.20-1.el7ae.noarch.rpm

Red Hat Ansible Engine 2.9 for RHEL 8:

Source:
ansible-2.9.20-1.el8ae.src.rpm

noarch:
ansible-2.9.20-1.el8ae.noarch.rpm
ansible-test-2.9.20-1.el8ae.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3447
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1JzD
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close