A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://github.com/ansible/ansible-runner/pull/742/commits | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1977965 | issue tracking patch vendor advisory |
https://access.redhat.com/security/cve/CVE-2021-3702 | vendor advisory |