<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ansible</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:2121-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-06-22T12:10:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-06-22T12:10:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-06-22T12:10:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ansible</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ansible fixes the following issues:

- Update to 2.9.22:
- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)
- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)
- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)
- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)
- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">HPE-Helion-OpenStack-8-2021-2121,SUSE-2021-2121,SUSE-OpenStack-Cloud-8-2021-2121,SUSE-OpenStack-Cloud-Crowbar-8-2021-2121</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      <Description>Link for SUSE-SU-2021:2121-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:2121-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180816</URL>
      <Description>SUSE Bug 1180816</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180942</URL>
      <Description>SUSE Bug 1180942</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181119</URL>
      <Description>SUSE Bug 1181119</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181935</URL>
      <Description>SUSE Bug 1181935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183684</URL>
      <Description>SUSE Bug 1183684</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20178/</URL>
      <Description>SUSE CVE CVE-2021-20178 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20180/</URL>
      <Description>SUSE CVE CVE-2021-20180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20191/</URL>
      <Description>SUSE CVE CVE-2021-20191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20228/</URL>
      <Description>SUSE CVE CVE-2021-20228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3447/</URL>
      <Description>SUSE CVE CVE-2021-3447 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="HPE Helion OpenStack 8">
      <Branch Type="Product Name" Name="HPE Helion OpenStack 8">
        <FullProductName ProductID="HPE Helion OpenStack 8" CPE="cpe:/o:suse:hpe-helion-openstack:8">HPE Helion OpenStack 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 8">
        <FullProductName ProductID="SUSE OpenStack Cloud 8" CPE="cpe:/o:suse:suse-openstack-cloud:8">SUSE OpenStack Cloud 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 8">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:8">SUSE OpenStack Cloud Crowbar 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ansible-2.9.22-3.18.1">
      <FullProductName ProductID="ansible-2.9.22-3.18.1">ansible-2.9.22-3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-doc-2.9.22-3.18.1">
      <FullProductName ProductID="ansible-doc-2.9.22-3.18.1">ansible-doc-2.9.22-3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ansible-test-2.9.22-3.18.1">
      <FullProductName ProductID="ansible-test-2.9.22-3.18.1">ansible-test-2.9.22-3.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ansible-2.9.22-3.18.1" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:ansible-2.9.22-3.18.1">ansible-2.9.22-3.18.1 as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.22-3.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1">ansible-2.9.22-3.18.1 as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="ansible-2.9.22-3.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1">ansible-2.9.22-3.18.1 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2021-20178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20178.html</URL>
        <Description>CVE-2021-20178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180816</URL>
        <Description>SUSE Bug 1180816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186493</URL>
        <Description>SUSE Bug 1186493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2021-20180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20180.html</URL>
        <Description>CVE-2021-20180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180942</URL>
        <Description>SUSE Bug 1180942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.</Note>
    </Notes>
    <CVE>CVE-2021-20191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20191.html</URL>
        <Description>CVE-2021-20191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181119</URL>
        <Description>SUSE Bug 1181119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181935</URL>
        <Description>SUSE Bug 1181935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.</Note>
    </Notes>
    <CVE>CVE-2021-20228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20228.html</URL>
        <Description>CVE-2021-20228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181935</URL>
        <Description>SUSE Bug 1181935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.</Note>
    </Notes>
    <CVE>CVE-2021-3447</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>HPE Helion OpenStack 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3447.html</URL>
        <Description>CVE-2021-3447</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183684</URL>
        <Description>SUSE Bug 1183684</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
