First published: Thu Jan 18 2024(Updated: )
An information disclosure flaw was found in ansible-core due to a failure to respect the `ANSIBLE_NO_LOG` configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ansible | <2.14.4 | 2.14.4 |
redhat/ansible | <2.15.9 | 2.15.9 |
redhat/ansible | <2.16.3 | 2.16.3 |
pip/ansible-core | >=2.15.0<2.15.9 | 2.15.9 |
pip/ansible-core | >=2.16.0<2.16.3 | 2.16.3 |
pip/ansible-core | <2.14.14 | 2.14.14 |
Ansible | <2.14.4 | |
Ansible | >=2.15.0<2.15.9 | |
Ansible | >=2.16.0<2.16.3 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
Any of | ||
redhat ANSIBLE automation platform | =2.4 | |
Red Hat Ansible Developer | =1.1 | |
Red Hat Ansible Inside | =1.2 | |
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedora | =38 | |
Fedora | =39 | |
IBM Db2 Warehouse | <=v3.5 through refresh 10v4.0 through refresh 9v4.5 through refresh 3v4.6 through refresh 6v4.7 through refresh 4v4.8 through refresh 4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0690 has been classified as an information disclosure vulnerability in ansible-core.
To remediate CVE-2024-0690, update ansible-core to versions 2.14.4, 2.15.9, or 2.16.3.
CVE-2024-0690 affects versions of ansible-core up to 2.14.4, versions between 2.15.0 and up to 2.15.9, and between 2.16.0 and up to 2.16.3.
While you can still use affected versions, it is strongly recommended to upgrade to mitigate the risk associated with CVE-2024-0690.
In addition to ansible-core, IBM's Db2 on Cloud Pak for Data and applications using affected versions of ansible may also be impacted by CVE-2024-0690.