Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-0690
Vulnerability from cvelistv5
Published
2024-02-06 12:00
Modified
2024-11-23 03:38
Severity ?
EPSS score ?
Summary
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 2.14.0 ≤ Version: 2.15.0 ≤ Version: 2.16.0 ≤ |
||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-06T18:30:30.103500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:35.753Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:11:35.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2024:0733", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "name": "RHSA-2024:2246", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2246" }, { "name": "RHSA-2024:3043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:3043" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "name": "RHBZ#2259013", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "tags": [ "x_transferred" ], "url": "https://github.com/ansible/ansible/pull/82565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://www.ansible.com/", "defaultStatus": "unaffected", "packageName": "ansible", "versions": [ { "lessThan": "2.14.4", "status": "affected", "version": "2.14.0", "versionType": "semver" }, { "lessThan": "2.15.9", "status": "affected", "version": "2.15.0", "versionType": "semver" }, { "lessThan": "2.16.3", "status": "affected", "version": "2.16.0", "versionType": "semver" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" ], "defaultStatus": "affected", "packageName": "ansible-core", "product": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1:2.15.9-1.el8ap", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" ], "defaultStatus": "affected", "packageName": "ansible-core", "product": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1:2.15.9-1.el9ap", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "ansible-core", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.16.3-2.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "ansible-core", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1:2.14.14-1.el9", "versionType": "rpm" } ] } ], "datePublic": "2024-01-18T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-117", "description": "Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-23T03:38:59.164Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:0733", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "name": "RHSA-2024:2246", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2246" }, { "name": "RHSA-2024:3043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:3043" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "name": "RHBZ#2259013", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "url": "https://github.com/ansible/ansible/pull/82565" } ], "timeline": [ { "lang": "en", "time": "2024-01-18T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-01-18T00:00:00+00:00", "value": "Made public." } ], "title": "Ansible-core: possible information leak in tasks that ignore ansible_no_log configuration", "workarounds": [ { "lang": "en", "value": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information." } ], "x_redhatCweChain": "CWE-117: Improper Output Neutralization for Logs" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-0690", "datePublished": "2024-02-06T12:00:28.505Z", "dateReserved": "2024-01-18T16:03:22.626Z", "dateUpdated": "2024-11-23T03:38:59.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-0690\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-02-06T12:15:55.530\",\"lastModified\":\"2024-11-21T08:47:09.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla de divulgaci\u00f3n de informaci\u00f3n en ansible-core debido a que no se respet\u00f3 la configuraci\u00f3n de ANSIBLE_NO_LOG en algunos escenarios. Se descubri\u00f3 que la informaci\u00f3n todav\u00eda se incluye en la salida de determinadas tareas, como los elementos del bucle. Dependiendo de la tarea, este problema puede incluir informaci\u00f3n confidencial, como valores secretos descifrados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.3,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-117\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.14.4\",\"matchCriteriaId\":\"645218EF-62EC-4EA5-B196-6C52CC6BF0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.15.0\",\"versionEndExcluding\":\"2.15.9\",\"matchCriteriaId\":\"B80D311E-FA64-4A61-BC42-441B56D3A019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.16.0\",\"versionEndExcluding\":\"2.16.3\",\"matchCriteriaId\":\"DA1B5190-DFC2-4C0F-B190-515D768BB3CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_automation_platform:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05986E3C-7E5B-45C1-81B0-9D856A8FF1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_developer:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE40363-D286-4EB7-80D2-17CF3B606AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_inside:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"897AB7AC-52B1-4335-97D5-D5EA2FF09CC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0733\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2246\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3043\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-0690\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2259013\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/ansible/ansible/pull/82565\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-0690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2259013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/ansible/ansible/pull/82565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]}]}}" } }
WID-SEC-W-2024-0157
Vulnerability from csaf_certbund
Published
2024-01-18 23:00
Modified
2024-05-21 22:00
Summary
Ansible: Schwachstelle ermöglicht Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Ansible ist eine Software zur Automatisierung von Cloud Provisionierung,
zum Konfigurationsmanagement und zur Anwendungsbereitstellung.
Fedora ist eine von Red Hat abstammende Linux-Distribution.
Angriff
Ein Angreifer kann eine Schwachstelle in Ansible ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Ansible ist eine Software zur Automatisierung von Cloud Provisionierung,\r\nzum Konfigurationsmanagement und zur Anwendungsbereitstellung.\r\nFedora ist eine von Red Hat abstammende Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann eine Schwachstelle in Ansible ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0157 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0157.json" }, { "category": "self", "summary": "WID-SEC-2024-0157 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0157" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-01-18", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "Anible GitHub vom 2024-01-18", "url": "https://github.com/ansible/ansible/commit/6935c8e303440addd3871ecf8e04bde61080b032" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cfa5a5cbac" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0322 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1427-1 vom 2024-04-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018418.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1509-1 vom 2024-05-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018463.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3043 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3043" } ], "source_lang": "en-US", "title": "Ansible: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:06:44.264+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0157", "initial_release_date": "2024-01-18T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Core \u003c2.14.11-2.fc38", "product": { "name": "Fedora Linux Core \u003c2.14.11-2.fc38", "product_id": "T032249", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:core__2.14.11-2.fc38" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Core \u003c2.14.11-2.fc38", "product": { "name": "Open Source Ansible Core \u003c2.14.11-2.fc38", "product_id": "T032248", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:core__2.14.11-2.fc38" } } } ], "category": "product_name", "name": "Ansible" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0690", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Ansible. Der Fehler besteht aufgrund der Nichtbeachtung der ANSIBLE_NO_LOG-Konfiguration in einigen Szenarien in ansible-core. Ein Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T002207", "67646" ] }, "release_date": "2024-01-18T23:00:00Z", "title": "CVE-2024-0690" } ] }
wid-sec-w-2024-0157
Vulnerability from csaf_certbund
Published
2024-01-18 23:00
Modified
2024-05-21 22:00
Summary
Ansible: Schwachstelle ermöglicht Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Ansible ist eine Software zur Automatisierung von Cloud Provisionierung,
zum Konfigurationsmanagement und zur Anwendungsbereitstellung.
Fedora ist eine von Red Hat abstammende Linux-Distribution.
Angriff
Ein Angreifer kann eine Schwachstelle in Ansible ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Ansible ist eine Software zur Automatisierung von Cloud Provisionierung,\r\nzum Konfigurationsmanagement und zur Anwendungsbereitstellung.\r\nFedora ist eine von Red Hat abstammende Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann eine Schwachstelle in Ansible ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0157 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0157.json" }, { "category": "self", "summary": "WID-SEC-2024-0157 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0157" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-01-18", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "Anible GitHub vom 2024-01-18", "url": "https://github.com/ansible/ansible/commit/6935c8e303440addd3871ecf8e04bde61080b032" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cfa5a5cbac" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0322 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1427-1 vom 2024-04-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018418.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1509-1 vom 2024-05-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018463.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3043 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3043" } ], "source_lang": "en-US", "title": "Ansible: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:06:44.264+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0157", "initial_release_date": "2024-01-18T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Core \u003c2.14.11-2.fc38", "product": { "name": "Fedora Linux Core \u003c2.14.11-2.fc38", "product_id": "T032249", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:core__2.14.11-2.fc38" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Core \u003c2.14.11-2.fc38", "product": { "name": "Open Source Ansible Core \u003c2.14.11-2.fc38", "product_id": "T032248", "product_identification_helper": { "cpe": "cpe:/a:open_source:ansible:core__2.14.11-2.fc38" } } } ], "category": "product_name", "name": "Ansible" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0690", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Ansible. Der Fehler besteht aufgrund der Nichtbeachtung der ANSIBLE_NO_LOG-Konfiguration in einigen Szenarien in ansible-core. Ein Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T002207", "67646" ] }, "release_date": "2024-01-18T23:00:00Z", "title": "CVE-2024-0690" } ] }
ghsa-h24r-m9qc-pvpg
Vulnerability from github
Published
2024-02-06 12:30
Modified
2024-05-22 18:30
Severity ?
Summary
Ansible-core information disclosure flaw
Details
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG
configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ansible-core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.14.14" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "ansible-core" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "ansible-core" }, "ranges": [ { "events": [ { "introduced": "2.15.0" }, { "fixed": "2.15.9" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-0690" ], "database_specific": { "cwe_ids": [ "CWE-116", "CWE-117" ], "github_reviewed": true, "github_reviewed_at": "2024-02-06T20:26:17Z", "nvd_published_at": "2024-02-06T12:15:55Z", "severity": "MODERATE" }, "details": "An information disclosure flaw was found in ansible-core due to a failure to respect the `ANSIBLE_NO_LOG` configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "id": "GHSA-h24r-m9qc-pvpg", "modified": "2024-05-22T18:30:39Z", "published": "2024-02-06T12:30:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/pull/82565" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/commit/6935c8e303440addd3871ecf8e04bde61080b032" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/commit/78db3a3de6b40fb52d216685ae7cb903c609c3e1" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/commit/b9a03bbf5a63459468baf8895ff74a62e9be4532" }, { "type": "WEB", "url": "https://github.com/ansible/ansible/commit/beb04bc2642c208447c5a936f94310528a1946b1" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2246" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:3043" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "type": "PACKAGE", "url": "https://github.com/ansible/ansible" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible-core/PYSEC-2024-36.yaml" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Ansible-core information disclosure flaw" }
gsd-2024-0690
Vulnerability from gsd
Modified
2024-01-19 06:02
Details
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-0690" ], "details": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "id": "GSD-2024-0690", "modified": "2024-01-19T06:02:11.693642Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2024-0690", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1:2.15.9-1.el8ap", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "1:2.15.9-1.el9ap", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-117", "lang": "eng", "value": "Improper Output Neutralization for Logs" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2024:0733", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "name": "https://access.redhat.com/security/cve/CVE-2024-0690", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "name": "https://github.com/ansible/ansible/pull/82565", "refsource": "MISC", "url": "https://github.com/ansible/ansible/pull/82565" } ] }, "work_around": [ { "lang": "en", "value": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information." } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "645218EF-62EC-4EA5-B196-6C52CC6BF0C6", "versionEndExcluding": "2.14.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "B80D311E-FA64-4A61-BC42-441B56D3A019", "versionEndExcluding": "2.15.9", "versionStartIncluding": "2.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1B5190-DFC2-4C0F-B190-515D768BB3CD", "versionEndExcluding": "2.16.3", "versionStartIncluding": "2.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_automation_platform:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "05986E3C-7E5B-45C1-81B0-9D856A8FF1CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_developer:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CEE40363-D286-4EB7-80D2-17CF3B606AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_inside:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "897AB7AC-52B1-4335-97D5-D5EA2FF09CC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values." }, { "lang": "es", "value": "Se encontr\u00f3 una falla de divulgaci\u00f3n de informaci\u00f3n en ansible-core debido a que no se respet\u00f3 la configuraci\u00f3n de ANSIBLE_NO_LOG en algunos escenarios. Se descubri\u00f3 que la informaci\u00f3n todav\u00eda se incluye en la salida de determinadas tareas, como los elementos del bucle. Dependiendo de la tarea, este problema puede incluir informaci\u00f3n confidencial, como valores secretos descifrados." } ], "id": "CVE-2024-0690", "lastModified": "2024-03-25T22:37:19.257", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-02-06T12:15:55.530", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/ansible/ansible/pull/82565" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-117" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
rhsa-2024_2246
Vulnerability from csaf_redhat
Published
2024-04-30 10:14
Modified
2024-11-23 03:39
Summary
Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update
Notes
Topic
An update for ansible-core is now available for Red Hat Enterprise Linux 9.
'Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
Security Fix(es):
* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)
Bug Fix(es):
* Update ansible-core to 2.14.14 (JIRA:RHEL-23783)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ansible-core is now available for Red Hat Enterprise Linux 9.\n\n\u0027Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.\n\nSecurity Fix(es):\n\n* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)\n\nBug Fix(es):\n\n* Update ansible-core to 2.14.14 (JIRA:RHEL-23783)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2246", "url": "https://access.redhat.com/errata/RHSA-2024:2246" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "RHEL-18950", "url": "https://issues.redhat.com/browse/RHEL-18950" }, { "category": "external", "summary": "RHEL-19298", "url": "https://issues.redhat.com/browse/RHEL-19298" }, { "category": "external", "summary": "RHEL-23783", "url": "https://issues.redhat.com/browse/RHEL-23783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2246.json" } ], "title": "Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update", "tracking": { "current_release_date": "2024-11-23T03:39:10+00:00", "generator": { "date": "2024-11-23T03:39:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2246", "initial_release_date": "2024-04-30T10:14:07+00:00", "revision_history": [ { "date": "2024-04-30T10:14:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T10:14:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T03:39:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ansible-core-1:2.14.14-1.el9.src", "product": { "name": "ansible-core-1:2.14.14-1.el9.src", "product_id": "ansible-core-1:2.14.14-1.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.14.14-1.el9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ansible-core-1:2.14.14-1.el9.aarch64", "product": { "name": "ansible-core-1:2.14.14-1.el9.aarch64", "product_id": "ansible-core-1:2.14.14-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.14.14-1.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.14.14-1.el9.aarch64", "product": { "name": "ansible-test-1:2.14.14-1.el9.aarch64", "product_id": "ansible-test-1:2.14.14-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.14.14-1.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ansible-core-1:2.14.14-1.el9.ppc64le", "product": { "name": "ansible-core-1:2.14.14-1.el9.ppc64le", "product_id": "ansible-core-1:2.14.14-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.14.14-1.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.14.14-1.el9.ppc64le", "product": { "name": "ansible-test-1:2.14.14-1.el9.ppc64le", "product_id": "ansible-test-1:2.14.14-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.14.14-1.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ansible-core-1:2.14.14-1.el9.x86_64", "product": { "name": "ansible-core-1:2.14.14-1.el9.x86_64", "product_id": "ansible-core-1:2.14.14-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.14.14-1.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.14.14-1.el9.x86_64", "product": { "name": "ansible-test-1:2.14.14-1.el9.x86_64", "product_id": "ansible-test-1:2.14.14-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.14.14-1.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ansible-core-1:2.14.14-1.el9.s390x", "product": { "name": "ansible-core-1:2.14.14-1.el9.s390x", "product_id": "ansible-core-1:2.14.14-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.14.14-1.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.14.14-1.el9.s390x", "product": { "name": "ansible-test-1:2.14.14-1.el9.s390x", "product_id": "ansible-test-1:2.14.14-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.14.14-1.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.14.14-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.aarch64" }, "product_reference": "ansible-core-1:2.14.14-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.14.14-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.ppc64le" }, "product_reference": "ansible-core-1:2.14.14-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.14.14-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.s390x" }, "product_reference": "ansible-core-1:2.14.14-1.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.14.14-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.src" }, "product_reference": "ansible-core-1:2.14.14-1.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.14.14-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.x86_64" }, "product_reference": "ansible-core-1:2.14.14-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.14.14-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.aarch64" }, "product_reference": "ansible-test-1:2.14.14-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.14.14-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.ppc64le" }, "product_reference": "ansible-test-1:2.14.14-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.14.14-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.s390x" }, "product_reference": "ansible-test-1:2.14.14-1.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.14.14-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.x86_64" }, "product_reference": "ansible-test-1:2.14.14-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0690", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2024-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259013" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.src", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.x86_64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "category": "external", "summary": "RHBZ#2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690" }, { "category": "external", "summary": "https://github.com/ansible/ansible/pull/82565", "url": "https://github.com/ansible/ansible/pull/82565" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:14:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.src", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.x86_64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2246" }, { "category": "workaround", "details": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information.", "product_ids": [ "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.src", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.x86_64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.src", "AppStream-9.4.0.GA:ansible-core-1:2.14.14-1.el9.x86_64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.aarch64", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.ppc64le", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.s390x", "AppStream-9.4.0.GA:ansible-test-1:2.14.14-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration" } ] }
rhsa-2024_3043
Vulnerability from csaf_redhat
Published
2024-05-22 10:18
Modified
2024-11-23 03:39
Summary
Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update
Notes
Topic
An update for ansible-core is now available for Red Hat Enterprise Linux 8.
'Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
Security Fix(es):
* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)
Bug Fix(es):
* Update ansible-core to 2.16.3 (JIRA:RHEL-23782)
* Rebuild ansible-core with python 3.12 (JIRA:RHEL-24141)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ansible-core is now available for Red Hat Enterprise Linux 8.\n\n\u0027Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.\n\nSecurity Fix(es):\n\n* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)\n\nBug Fix(es):\n\n* Update ansible-core to 2.16.3 (JIRA:RHEL-23782)\n\n* Rebuild ansible-core with python 3.12 (JIRA:RHEL-24141)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3043", "url": "https://access.redhat.com/errata/RHSA-2024:3043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "RHEL-18965", "url": "https://issues.redhat.com/browse/RHEL-18965" }, { "category": "external", "summary": "RHEL-19297", "url": "https://issues.redhat.com/browse/RHEL-19297" }, { "category": "external", "summary": "RHEL-23782", "url": "https://issues.redhat.com/browse/RHEL-23782" }, { "category": "external", "summary": "RHEL-24141", "url": "https://issues.redhat.com/browse/RHEL-24141" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3043.json" } ], "title": "Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update", "tracking": { "current_release_date": "2024-11-23T03:39:19+00:00", "generator": { "date": "2024-11-23T03:39:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:3043", "initial_release_date": "2024-05-22T10:18:55+00:00", "revision_history": [ { "date": "2024-05-22T10:18:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-22T10:18:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T03:39:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ansible-core-0:2.16.3-2.el8.src", "product": { "name": "ansible-core-0:2.16.3-2.el8.src", "product_id": "ansible-core-0:2.16.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.16.3-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ansible-core-0:2.16.3-2.el8.aarch64", "product": { "name": "ansible-core-0:2.16.3-2.el8.aarch64", "product_id": "ansible-core-0:2.16.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.16.3-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ansible-test-0:2.16.3-2.el8.aarch64", "product": { "name": "ansible-test-0:2.16.3-2.el8.aarch64", "product_id": "ansible-test-0:2.16.3-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.16.3-2.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ansible-core-0:2.16.3-2.el8.ppc64le", "product": { "name": "ansible-core-0:2.16.3-2.el8.ppc64le", "product_id": "ansible-core-0:2.16.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.16.3-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ansible-test-0:2.16.3-2.el8.ppc64le", "product": { "name": "ansible-test-0:2.16.3-2.el8.ppc64le", "product_id": "ansible-test-0:2.16.3-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.16.3-2.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ansible-core-0:2.16.3-2.el8.x86_64", "product": { "name": "ansible-core-0:2.16.3-2.el8.x86_64", "product_id": "ansible-core-0:2.16.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.16.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-test-0:2.16.3-2.el8.x86_64", "product": { "name": "ansible-test-0:2.16.3-2.el8.x86_64", "product_id": "ansible-test-0:2.16.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.16.3-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ansible-core-0:2.16.3-2.el8.s390x", "product": { "name": "ansible-core-0:2.16.3-2.el8.s390x", "product_id": "ansible-core-0:2.16.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.16.3-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "ansible-test-0:2.16.3-2.el8.s390x", "product": { "name": "ansible-test-0:2.16.3-2.el8.s390x", "product_id": "ansible-test-0:2.16.3-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.16.3-2.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-core-0:2.16.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.aarch64" }, "product_reference": "ansible-core-0:2.16.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-0:2.16.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.ppc64le" }, "product_reference": "ansible-core-0:2.16.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-0:2.16.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.s390x" }, "product_reference": "ansible-core-0:2.16.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-0:2.16.3-2.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.src" }, "product_reference": "ansible-core-0:2.16.3-2.el8.src", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-0:2.16.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.x86_64" }, "product_reference": "ansible-core-0:2.16.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-0:2.16.3-2.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.aarch64" }, "product_reference": "ansible-test-0:2.16.3-2.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-0:2.16.3-2.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.ppc64le" }, "product_reference": "ansible-test-0:2.16.3-2.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-0:2.16.3-2.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.s390x" }, "product_reference": "ansible-test-0:2.16.3-2.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-0:2.16.3-2.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.x86_64" }, "product_reference": "ansible-test-0:2.16.3-2.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-0690", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2024-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259013" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.src", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.x86_64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "category": "external", "summary": "RHBZ#2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690" }, { "category": "external", "summary": "https://github.com/ansible/ansible/pull/82565", "url": "https://github.com/ansible/ansible/pull/82565" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.src", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.x86_64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3043" }, { "category": "workaround", "details": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information.", "product_ids": [ "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.src", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.x86_64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.src", "AppStream-8.10.0.GA:ansible-core-0:2.16.3-2.el8.x86_64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.aarch64", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.ppc64le", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.s390x", "AppStream-8.10.0.GA:ansible-test-0:2.16.3-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration" } ] }
rhsa-2024_0733
Vulnerability from csaf_redhat
Published
2024-02-07 20:46
Modified
2024-11-23 03:39
Summary
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
Notes
Topic
An update is now available for Red Hat Ansible Automation Platform 2.4
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.
Security Fix(es):
* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)
* automation-controller: urllib3: Cookie request header isn't stripped during cross-origin (CVE-2023-43804)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updates and fixes for automation controller:
* Fixed jobs stuck in pending state after connection to database recover (AAP-19618)
* Added secure flag option for userLoggedIn cookie if 'SESSION_COOKIE_SECURE' is set to 'True' (AAP-19602)
* Fixed 'twilio_backend.py' to send SMS to multiple destinations (AAP-19284)
* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)
* Fixed a TypeError in the Logging Settings Edit form of the automation controller user interface to no longer render the form inputs inaccessible (AAP-18960)
* Fixed Delinea (previously: Thycotic) DevOps Secrets Vault credential plugin to work with python-dsv-sdk>=1.0.4 (AAP-18701)
* Updated schedule Prompt on launch fields to persist while editing (AAP-13859)
* automation-controller has been updated to 4.5.1
Note: The 2.4-5 installer/setup should be used to update automation controller to 4.5.1
Updates and fixes for ansible-core:
* ansible-core has been updated to 2.15.9
Updates and fixes for installer, setup and setup bundle:
* Fixed the version check when pinning EDA to an older version (AAP-19399)
* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)
* Automation Hub now uses system crypto-policies in nginx (AAP-18974)
* installer, setup and setup bundle have been updated to 2.4-5
Additionally, setup bundle 2.4-5 includes the updates released in the following advisories:
RHSA-2024:0322
* python3-dynaconf/python39-dynaconf 3.1.12-2
* python3-gitpython/python39-gitpython 3.1.40
* python3-twisted/python39-twisted 23.10.0
RHBA-2023:7863
* container images
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)\n\n* automation-controller: urllib3: Cookie request header isn\u0027t stripped during cross-origin (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes for automation controller:\n* Fixed jobs stuck in pending state after connection to database recover (AAP-19618)\n* Added secure flag option for userLoggedIn cookie if \u0027SESSION_COOKIE_SECURE\u0027 is set to \u0027True\u0027 (AAP-19602)\n* Fixed \u0027twilio_backend.py\u0027 to send SMS to multiple destinations (AAP-19284)\n* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)\n* Fixed a TypeError in the Logging Settings Edit form of the automation controller user interface to no longer render the form inputs inaccessible (AAP-18960)\n* Fixed Delinea (previously: Thycotic) DevOps Secrets Vault credential plugin to work with python-dsv-sdk\u003e=1.0.4 (AAP-18701)\n* Updated schedule Prompt on launch fields to persist while editing (AAP-13859)\n* automation-controller has been updated to 4.5.1\n\nNote: The 2.4-5 installer/setup should be used to update automation controller to 4.5.1\n\nUpdates and fixes for ansible-core:\n* ansible-core has been updated to 2.15.9\n\nUpdates and fixes for installer, setup and setup bundle:\n* Fixed the version check when pinning EDA to an older version (AAP-19399)\n* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)\n* Automation Hub now uses system crypto-policies in nginx (AAP-18974)\n* installer, setup and setup bundle have been updated to 2.4-5\n\nAdditionally, setup bundle 2.4-5 includes the updates released in the following advisories:\n\nRHSA-2024:0322\n* python3-dynaconf/python39-dynaconf 3.1.12-2\n* python3-gitpython/python39-gitpython 3.1.40\n* python3-twisted/python39-twisted 23.10.0\n\nRHBA-2023:7863\n* container images", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0733", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/errata/RHSA-2024:0322", "url": "https://access.redhat.com/errata/RHSA-2024:0322" }, { "category": "external", "summary": "https://access.redhat.com/errata/RHBA-2023:7863", "url": "https://access.redhat.com/errata/RHBA-2023:7863" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0733.json" } ], "title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update", "tracking": { "current_release_date": "2024-11-23T03:39:00+00:00", "generator": { "date": "2024-11-23T03:39:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0733", "initial_release_date": "2024-02-07T20:46:32+00:00", "revision_history": [ { "date": "2024-02-07T20:46:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-02-07T20:46:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T03:39:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat Ansible Automation Platform" }, { "branches": [ { "category": "product_version", "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src", "product": { "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src", "product_id": "ansible-automation-platform-installer-0:2.4-5.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el9ap?arch=src" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el9ap.src", "product": { "name": "automation-controller-0:4.5.1-1.el9ap.src", "product_id": "automation-controller-0:4.5.1-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.9-1.el9ap.src", "product": { "name": "ansible-core-1:2.15.9-1.el9ap.src", "product_id": "ansible-core-1:2.15.9-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el9ap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src", "product": { "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src", "product_id": "ansible-automation-platform-installer-0:2.4-5.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el8ap?arch=src" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el8ap.src", "product": { "name": "automation-controller-0:4.5.1-1.el8ap.src", "product_id": "automation-controller-0:4.5.1-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.9-1.el8ap.src", "product": { "name": "ansible-core-1:2.15.9-1.el8ap.src", "product_id": "ansible-core-1:2.15.9-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el8ap?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "product": { "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "product_id": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch", "product": { "name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch", "product_id": "automation-controller-cli-0:4.5.1-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-cli@4.5.1-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-server-0:4.5.1-1.el9ap.noarch", "product": { "name": "automation-controller-server-0:4.5.1-1.el9ap.noarch", "product_id": "automation-controller-server-0:4.5.1-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-server@4.5.1-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch", "product": { "name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch", "product_id": "automation-controller-ui-0:4.5.1-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-ui@4.5.1-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.9-1.el9ap.noarch", "product": { "name": "ansible-core-1:2.15.9-1.el9ap.noarch", "product_id": "ansible-core-1:2.15.9-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el9ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.15.9-1.el9ap.noarch", "product": { "name": "ansible-test-1:2.15.9-1.el9ap.noarch", "product_id": "ansible-test-1:2.15.9-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.15.9-1.el9ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "product": { "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "product_id": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch", "product": { "name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch", "product_id": "automation-controller-cli-0:4.5.1-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-cli@4.5.1-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-server-0:4.5.1-1.el8ap.noarch", "product": { "name": "automation-controller-server-0:4.5.1-1.el8ap.noarch", "product_id": "automation-controller-server-0:4.5.1-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-server@4.5.1-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch", "product": { "name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch", "product_id": "automation-controller-ui-0:4.5.1-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-ui@4.5.1-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.9-1.el8ap.noarch", "product": { "name": "ansible-core-1:2.15.9-1.el8ap.noarch", "product_id": "ansible-core-1:2.15.9-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el8ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.15.9-1.el8ap.noarch", "product": { "name": "ansible-test-1:2.15.9-1.el8ap.noarch", "product_id": "ansible-test-1:2.15.9-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.15.9-1.el8ap?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el9ap.x86_64", "product": { "name": "automation-controller-0:4.5.1-1.el9ap.x86_64", "product_id": "automation-controller-0:4.5.1-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el8ap.x86_64", "product": { "name": "automation-controller-0:4.5.1-1.el8ap.x86_64", "product_id": "automation-controller-0:4.5.1-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el9ap.ppc64le", "product": { "name": "automation-controller-0:4.5.1-1.el9ap.ppc64le", "product_id": "automation-controller-0:4.5.1-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el8ap.ppc64le", "product": { "name": "automation-controller-0:4.5.1-1.el8ap.ppc64le", "product_id": "automation-controller-0:4.5.1-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el9ap.s390x", "product": { "name": "automation-controller-0:4.5.1-1.el9ap.s390x", "product_id": "automation-controller-0:4.5.1-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el8ap.s390x", "product": { "name": "automation-controller-0:4.5.1-1.el8ap.s390x", "product_id": "automation-controller-0:4.5.1-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el9ap.aarch64", "product": { "name": "automation-controller-0:4.5.1-1.el9ap.aarch64", "product_id": "automation-controller-0:4.5.1-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.1-1.el8ap.aarch64", "product": { "name": "automation-controller-0:4.5.1-1.el8ap.aarch64", "product_id": "automation-controller-0:4.5.1-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "product": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch" }, "product_reference": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src" }, "product_reference": "ansible-automation-platform-installer-0:2.4-5.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64" }, "product_reference": "automation-controller-0:4.5.1-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le" }, "product_reference": "automation-controller-0:4.5.1-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x" }, "product_reference": "automation-controller-0:4.5.1-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src" }, "product_reference": "automation-controller-0:4.5.1-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64" }, "product_reference": "automation-controller-0:4.5.1-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch" }, "product_reference": "automation-controller-cli-0:4.5.1-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-server-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch" }, "product_reference": "automation-controller-server-0:4.5.1-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch" }, "product_reference": "automation-controller-ui-0:4.5.1-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch" }, "product_reference": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src" }, "product_reference": "ansible-automation-platform-installer-0:2.4-5.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.9-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64" }, "product_reference": "automation-controller-0:4.5.1-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le" }, "product_reference": "automation-controller-0:4.5.1-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x" }, "product_reference": "automation-controller-0:4.5.1-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src" }, "product_reference": "automation-controller-0:4.5.1-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.1-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64" }, "product_reference": "automation-controller-0:4.5.1-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch" }, "product_reference": "automation-controller-cli-0:4.5.1-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-server-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch" }, "product_reference": "automation-controller-server-0:4.5.1-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch" }, "product_reference": "automation-controller-ui-0:4.5.1-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" }, "product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-02-07T20:46:32+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" }, { "cve": "CVE-2024-0690", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2024-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259013" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "category": "external", "summary": "RHBZ#2259013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0690", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690" }, { "category": "external", "summary": "https://github.com/ansible/ansible/pull/82565", "url": "https://github.com/ansible/ansible/pull/82565" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-02-07T20:46:32+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "workaround", "details": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration" } ] }
pysec-2024-36
Vulnerability from pysec
Published
2024-02-06 12:15
Modified
2024-02-14 07:20
Severity ?
Details
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ansible-core", "purl": "pkg:pypi/ansible-core" }, "ranges": [ { "events": [ { "introduced": "2.16.0" }, { "fixed": "2.16.3" }, { "introduced": "2.15.0" }, { "fixed": "2.15.9" }, { "introduced": "0" }, { "fixed": "2.14.4" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.0.1a1", "2.11.0", "2.11.0b1", "2.11.0b2", "2.11.0b3", "2.11.0b4", "2.11.0rc1", "2.11.0rc2", "2.11.1", "2.11.10", "2.11.10rc1", "2.11.11", "2.11.11rc1", "2.11.12", "2.11.12rc1", "2.11.1rc1", "2.11.2", "2.11.2rc1", "2.11.3", "2.11.3rc1", "2.11.4", "2.11.4rc1", "2.11.5", "2.11.5rc1", "2.11.6", "2.11.6rc1", "2.11.7", "2.11.7rc1", "2.11.8", "2.11.8rc1", "2.11.9", "2.11.9rc1", "2.12.0", "2.12.0b1", "2.12.0b2", "2.12.0rc1", "2.12.1", "2.12.10", "2.12.10rc1", "2.12.1rc1", "2.12.2", "2.12.2rc1", "2.12.3", "2.12.3rc1", "2.12.4", "2.12.4rc1", "2.12.5", "2.12.5rc1", "2.12.6", "2.12.6rc1", "2.12.7", "2.12.7rc1", "2.12.8", "2.12.8rc1", "2.12.9", "2.12.9rc1", "2.13.0", "2.13.0b0", "2.13.0b1", "2.13.0rc1", "2.13.1", "2.13.10", "2.13.10rc1", "2.13.11", "2.13.11rc1", "2.13.12", "2.13.12rc1", "2.13.13", "2.13.13rc1", "2.13.1rc1", "2.13.2", "2.13.2rc1", "2.13.3", "2.13.3rc1", "2.13.4", "2.13.4rc1", "2.13.5", "2.13.5rc1", "2.13.6", "2.13.6rc1", "2.13.7", "2.13.7rc1", "2.13.8", "2.13.8rc1", "2.13.9", "2.13.9rc1", "2.14.0", "2.14.0b1", "2.14.0b2", "2.14.0b3", "2.14.0rc1", "2.14.0rc1.post0", "2.14.0rc2", "2.14.1", "2.14.1rc1", "2.14.2", "2.14.2rc1", "2.14.3", "2.14.3rc1", "2.14.4rc1", "2.15.0", "2.15.1", "2.15.1rc1", "2.15.2", "2.15.2rc1", "2.15.3", "2.15.3rc1", "2.15.4", "2.15.4rc1", "2.15.5", "2.15.5rc1", "2.15.6", "2.15.6rc1", "2.15.7", "2.15.7rc1", "2.15.8", "2.15.9rc1", "2.16.0", "2.16.1", "2.16.1rc1", "2.16.2", "2.16.3rc1" ] } ], "aliases": [ "CVE-2024-0690" ], "details": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.", "id": "PYSEC-2024-36", "modified": "2024-02-14T07:20:09.911618+00:00", "published": "2024-02-06T12:15:00+00:00", "references": [ { "type": "ADVISORY", "url": "https://access.redhat.com/security/cve/CVE-2024-0690" }, { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013" }, { "type": "REPORT", "url": "https://github.com/ansible/ansible/pull/82565" }, { "type": "FIX", "url": "https://github.com/ansible/ansible/pull/82565" }, { "type": "ADVISORY", "url": "https://access.redhat.com/errata/RHSA-2024:0733" } ], "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.