A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-3702 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1977965 | Issue Tracking Patch Vendor Advisory |
https://github.com/ansible/ansible-runner/pull/742/commits | Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-3702 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1977965 | Issue Tracking Patch Vendor Advisory |
https://github.com/ansible/ansible-runner/pull/742/commits | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2021-3702 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1977965 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/ansible/ansible-runner/pull/742/commits - Patch, Third Party Advisory |
Information
Published : 2022-08-23 16:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3702
Mitre link : CVE-2021-3702
CVE.ORG link : CVE-2021-3702
JSON object : View
Products Affected
redhat
- ansible_runner
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')