Vulnerability from csaf_suse
Published
2021-06-22 12:10
Modified
2021-06-22 12:10
Summary
Security update for ansible

Notes

Title of the patch
Security update for ansible
Description of the patch
This update for ansible fixes the following issues: - Update to 2.9.22: - CVE-2021-3447: multiple modules expose secured values (bsc#1183684) - CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935) - CVE-2021-20191: multiple collections exposes secured values (bsc#1181119) - CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942) - CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)
Patchnames
HPE-Helion-OpenStack-8-2021-2121,SUSE-2021-2121,SUSE-OpenStack-Cloud-8-2021-2121,SUSE-OpenStack-Cloud-Crowbar-8-2021-2121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for ansible",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for ansible fixes the following issues:\n\n- Update to 2.9.22:\n- CVE-2021-3447: multiple modules expose secured values (bsc#1183684)\n- CVE-2021-20228: basic.py no_log with fallback option (bsc#1181935)\n- CVE-2021-20191: multiple collections exposes secured values (bsc#1181119)\n- CVE-2021-20180: bitbucket_pipeline_variable exposes sensitive values (bsc#1180942)\n- CVE-2021-20178: user data leak in snmp_facts module (bsc#1180816)\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "HPE-Helion-OpenStack-8-2021-2121,SUSE-2021-2121,SUSE-OpenStack-Cloud-8-2021-2121,SUSE-OpenStack-Cloud-Crowbar-8-2021-2121",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2121-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2021:2121-1",
            url: "https://www.suse.com/support/update/announcement/2021/suse-su-20212121-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2021:2121-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1180816",
            url: "https://bugzilla.suse.com/1180816",
         },
         {
            category: "self",
            summary: "SUSE Bug 1180942",
            url: "https://bugzilla.suse.com/1180942",
         },
         {
            category: "self",
            summary: "SUSE Bug 1181119",
            url: "https://bugzilla.suse.com/1181119",
         },
         {
            category: "self",
            summary: "SUSE Bug 1181935",
            url: "https://bugzilla.suse.com/1181935",
         },
         {
            category: "self",
            summary: "SUSE Bug 1183684",
            url: "https://bugzilla.suse.com/1183684",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-20178 page",
            url: "https://www.suse.com/security/cve/CVE-2021-20178/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-20180 page",
            url: "https://www.suse.com/security/cve/CVE-2021-20180/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-20191 page",
            url: "https://www.suse.com/security/cve/CVE-2021-20191/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-20228 page",
            url: "https://www.suse.com/security/cve/CVE-2021-20228/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3447 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3447/",
         },
      ],
      title: "Security update for ansible",
      tracking: {
         current_release_date: "2021-06-22T12:10:48Z",
         generator: {
            date: "2021-06-22T12:10:48Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2021:2121-1",
         initial_release_date: "2021-06-22T12:10:48Z",
         revision_history: [
            {
               date: "2021-06-22T12:10:48Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "ansible-2.9.22-3.18.1.aarch64",
                        product: {
                           name: "ansible-2.9.22-3.18.1.aarch64",
                           product_id: "ansible-2.9.22-3.18.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-doc-2.9.22-3.18.1.aarch64",
                        product: {
                           name: "ansible-doc-2.9.22-3.18.1.aarch64",
                           product_id: "ansible-doc-2.9.22-3.18.1.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-test-2.9.22-3.18.1.aarch64",
                        product: {
                           name: "ansible-test-2.9.22-3.18.1.aarch64",
                           product_id: "ansible-test-2.9.22-3.18.1.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "ansible-2.9.22-3.18.1.ppc64le",
                        product: {
                           name: "ansible-2.9.22-3.18.1.ppc64le",
                           product_id: "ansible-2.9.22-3.18.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-doc-2.9.22-3.18.1.ppc64le",
                        product: {
                           name: "ansible-doc-2.9.22-3.18.1.ppc64le",
                           product_id: "ansible-doc-2.9.22-3.18.1.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-test-2.9.22-3.18.1.ppc64le",
                        product: {
                           name: "ansible-test-2.9.22-3.18.1.ppc64le",
                           product_id: "ansible-test-2.9.22-3.18.1.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "ansible-2.9.22-3.18.1.s390x",
                        product: {
                           name: "ansible-2.9.22-3.18.1.s390x",
                           product_id: "ansible-2.9.22-3.18.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-doc-2.9.22-3.18.1.s390x",
                        product: {
                           name: "ansible-doc-2.9.22-3.18.1.s390x",
                           product_id: "ansible-doc-2.9.22-3.18.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-test-2.9.22-3.18.1.s390x",
                        product: {
                           name: "ansible-test-2.9.22-3.18.1.s390x",
                           product_id: "ansible-test-2.9.22-3.18.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "ansible-2.9.22-3.18.1.x86_64",
                        product: {
                           name: "ansible-2.9.22-3.18.1.x86_64",
                           product_id: "ansible-2.9.22-3.18.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-doc-2.9.22-3.18.1.x86_64",
                        product: {
                           name: "ansible-doc-2.9.22-3.18.1.x86_64",
                           product_id: "ansible-doc-2.9.22-3.18.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ansible-test-2.9.22-3.18.1.x86_64",
                        product: {
                           name: "ansible-test-2.9.22-3.18.1.x86_64",
                           product_id: "ansible-test-2.9.22-3.18.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "HPE Helion OpenStack 8",
                        product: {
                           name: "HPE Helion OpenStack 8",
                           product_id: "HPE Helion OpenStack 8",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:hpe-helion-openstack:8",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE OpenStack Cloud 8",
                        product: {
                           name: "SUSE OpenStack Cloud 8",
                           product_id: "SUSE OpenStack Cloud 8",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:suse-openstack-cloud:8",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE OpenStack Cloud Crowbar 8",
                        product: {
                           name: "SUSE OpenStack Cloud Crowbar 8",
                           product_id: "SUSE OpenStack Cloud Crowbar 8",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "ansible-2.9.22-3.18.1.x86_64 as component of HPE Helion OpenStack 8",
               product_id: "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
            },
            product_reference: "ansible-2.9.22-3.18.1.x86_64",
            relates_to_product_reference: "HPE Helion OpenStack 8",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ansible-2.9.22-3.18.1.x86_64 as component of SUSE OpenStack Cloud 8",
               product_id: "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
            },
            product_reference: "ansible-2.9.22-3.18.1.x86_64",
            relates_to_product_reference: "SUSE OpenStack Cloud 8",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ansible-2.9.22-3.18.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
               product_id: "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            },
            product_reference: "ansible-2.9.22-3.18.1.x86_64",
            relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2021-20178",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-20178",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-20178",
               url: "https://www.suse.com/security/cve/CVE-2021-20178",
            },
            {
               category: "external",
               summary: "SUSE Bug 1180816 for CVE-2021-20178",
               url: "https://bugzilla.suse.com/1180816",
            },
            {
               category: "external",
               summary: "SUSE Bug 1186493 for CVE-2021-20178",
               url: "https://bugzilla.suse.com/1186493",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2021-06-22T12:10:48Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-20178",
      },
      {
         cve: "CVE-2021-20180",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-20180",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-20180",
               url: "https://www.suse.com/security/cve/CVE-2021-20180",
            },
            {
               category: "external",
               summary: "SUSE Bug 1180942 for CVE-2021-20180",
               url: "https://bugzilla.suse.com/1180942",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2021-06-22T12:10:48Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-20180",
      },
      {
         cve: "CVE-2021-20191",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-20191",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-20191",
               url: "https://www.suse.com/security/cve/CVE-2021-20191",
            },
            {
               category: "external",
               summary: "SUSE Bug 1181119 for CVE-2021-20191",
               url: "https://bugzilla.suse.com/1181119",
            },
            {
               category: "external",
               summary: "SUSE Bug 1181935 for CVE-2021-20191",
               url: "https://bugzilla.suse.com/1181935",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2021-06-22T12:10:48Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-20191",
      },
      {
         cve: "CVE-2021-20228",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-20228",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-20228",
               url: "https://www.suse.com/security/cve/CVE-2021-20228",
            },
            {
               category: "external",
               summary: "SUSE Bug 1181935 for CVE-2021-20228",
               url: "https://bugzilla.suse.com/1181935",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2021-06-22T12:10:48Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-20228",
      },
      {
         cve: "CVE-2021-3447",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3447",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
               "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3447",
               url: "https://www.suse.com/security/cve/CVE-2021-3447",
            },
            {
               category: "external",
               summary: "SUSE Bug 1183684 for CVE-2021-3447",
               url: "https://bugzilla.suse.com/1183684",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "HPE Helion OpenStack 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud 8:ansible-2.9.22-3.18.1.x86_64",
                  "SUSE OpenStack Cloud Crowbar 8:ansible-2.9.22-3.18.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2021-06-22T12:10:48Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-3447",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.