SB2021062244 - SUSE update for ansible 



SB2021062244 - SUSE update for ansible

Published: June 22, 2021

Security Bulletin ID SB2021062244
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2021-20178)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the snmp_facts module in Ansible discloses 'authkey' and 'privkey' credentials. A local user with access to the output of playbook execution can obtain SNMP credentials.


2) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2021-20180)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the bitbucket_pipeline_variable module in ansible-collection discloses by default credentials in the console log. A local user can obtain bitbucket_pipeline credentials.


3) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2021-20191)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A local user can read the log files and gain access to sensitive data.


4) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2021-20228)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files in the Ansible Engine|. A local user can read the log files and gain access to sensitive data.


5) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2021-3447)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. A local user can read the log files and gain access to sensitive data.


Remediation

Install update from vendor's website.