UBUNTU-CVE-2021-27022

Source
https://ubuntu.com/security/CVE-2021-27022
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-27022
Upstream
Published
2021-09-07T14:15:00Z
Modified
2025-10-24T04:50:11Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

A flaw was discovered in bolt-server and ace where running a task with sensitive parameters results in those sensitive parameters being logged when they should not be. This issue only affects SSH/WinRM nodes (inventory service nodes).

References

Affected packages

Ubuntu:14.04:LTS / puppet

Package

Name
puppet
Purl
pkg:deb/ubuntu/puppet@3.4.3-1ubuntu1.3?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.2.4-2ubuntu2
3.3.1-1ubuntu1
3.3.1-1ubuntu2
3.3.1-1ubuntu3
3.4.2-1
3.4.3-1
3.4.3-1ubuntu1
3.4.3-1ubuntu1.1
3.4.3-1ubuntu1.2
3.4.3-1ubuntu1.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppet"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppet-common"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppet-el"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppet-testsuite"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppetmaster"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppetmaster-common"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "puppetmaster-passenger"
        },
        {
            "binary_version": "3.4.3-1ubuntu1.3",
            "binary_name": "vim-puppet"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json"

Ubuntu:Pro:16.04:LTS / puppet

Package

Name
puppet
Purl
pkg:deb/ubuntu/puppet@3.8.5-2ubuntu0.1+esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.7.2-5ubuntu2
3.8.4-1ubuntu1
3.8.5-1ubuntu1
3.8.5-2
3.8.5-2ubuntu0.1
3.8.5-2ubuntu0.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppet"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppet-common"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppet-el"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppet-testsuite"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppetmaster"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppetmaster-common"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "puppetmaster-passenger"
        },
        {
            "binary_version": "3.8.5-2ubuntu0.1+esm1",
            "binary_name": "vim-puppet"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json"

Ubuntu:18.04:LTS / puppet

Package

Name
puppet
Purl
pkg:deb/ubuntu/puppet@5.4.0-2ubuntu3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.10.4-2ubuntu1
4.10.4-2ubuntu2
4.10.4-2ubuntu3
5.*
5.4.0-2ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppet"
        },
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppet-common"
        },
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppet-master"
        },
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppet-master-passenger"
        },
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppetmaster"
        },
        {
            "binary_version": "5.4.0-2ubuntu3",
            "binary_name": "puppetmaster-passenger"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json"

Ubuntu:20.04:LTS / puppet

Package

Name
puppet
Purl
pkg:deb/ubuntu/puppet@5.5.10-4ubuntu3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.0-2ubuntu3
5.5.10-4ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppet"
        },
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppet-common"
        },
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppet-master"
        },
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppet-master-passenger"
        },
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppetmaster"
        },
        {
            "binary_version": "5.5.10-4ubuntu3",
            "binary_name": "puppetmaster-passenger"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json"

Ubuntu:22.04:LTS / puppet

Package

Name
puppet
Purl
pkg:deb/ubuntu/puppet@5.5.22-4ubuntu0.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.5.22-1ubuntu1
5.5.22-4
5.5.22-4ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.5.22-4ubuntu0.2",
            "binary_name": "puppet"
        },
        {
            "binary_version": "5.5.22-4ubuntu0.2",
            "binary_name": "puppet-master"
        },
        {
            "binary_version": "5.5.22-4ubuntu0.2",
            "binary_name": "puppet-master-passenger"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-27022.json"