RedHat: RHSA-2020-0215:01 Moderate: Ansible security and bug fix update

    Date 23 Jan 2020
    553
    Posted By LinuxSecurity Advisories
    An update for ansible is now available for Ansible Engine 2.9 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: Ansible security and bug fix update (2.9.4)
    Advisory ID:       RHSA-2020:0215-01
    Product:           Red Hat Ansible Engine
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0215
    Issue date:        2020-01-23
    CVE Names:         CVE-2019-14904 CVE-2019-14905 
    =====================================================================
    
    1. Summary:
    
    An update for ansible is now available for Ansible Engine 2.9
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Ansible Engine 2.9 for RHEL 7 Server - noarch
    Red Hat Ansible Engine 2.9 for RHEL 8 - noarch
    
    3. Description:
    
    Ansible is a simple model-driven configuration management, multi-node
    deployment, and remote-task execution system. Ansible works over SSH and
    does not require any software or daemons to be installed on remote nodes.
    Extension modules can be written in any language and are transferred to
    managed machines automatically.
    
    The following packages have been upgraded to a newer upstream version:
    ansible (2.9.4)
    
    Bug Fix(es):
    * CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted
    solaris zone
    * CVE-2019-14905 Ansible: malicious code could craft filename in
    nxos_file_copy module
    
    See:
    https://github.com/ansible/ansible/blob/v2.9.4/changelogs/CHANGELOG-v2.9.rs
    t
    for details on bug fixes in this release.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1776943 - CVE-2019-14905 Ansible: malicious code could craft filename in nxos_file_copy module
    1776944 - CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted solaris zone
    
    6. Package List:
    
    Red Hat Ansible Engine 2.9 for RHEL 7 Server:
    
    Source:
    ansible-2.9.4-1.el7ae.src.rpm
    
    noarch:
    ansible-2.9.4-1.el7ae.noarch.rpm
    ansible-test-2.9.4-1.el7ae.noarch.rpm
    
    Red Hat Ansible Engine 2.9 for RHEL 8:
    
    Source:
    ansible-2.9.4-1.el8ae.src.rpm
    
    noarch:
    ansible-2.9.4-1.el8ae.noarch.rpm
    ansible-test-2.9.4-1.el8ae.noarch.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-14904
    https://access.redhat.com/security/cve/CVE-2019-14905
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXinOyNzjgjWX9erEAQhU3Q//Yv8/zMb+PGr6jyvtButQDdck+2A55LoC
    Uve7xPBXnAspbcs8NQgNsRC2r3BDqjQiIAupZ2lNZFcNjVfoQ4YiwxevFxJ1mMKx
    InumBN5yT9Y5d9N3kQA+v8PbA/Rqn3kQgyQsJA955Mv31Hlmi8IoSknDw0QIcUwu
    9FQELFX5bGiH7DD1cbpx9S8UNIh+fXWa6RWzEfmsGzTpw0OIQxMDqtgs1gt7exwh
    XcoYOmUJcLoDEYjuaRyrs5AoKLtg/KEmy64QKUD/LVDBo9qp+OzQ9BxVjWeLkK86
    xeBjiAyYki8R8rfozj5/XsAHqKEXdCm4FlHiKOUXq5WZusmHCwFTw9lqhBSHhmtF
    kzVvHykFhXDTcXkB8QbAccc65KPot2+gCu8Wue3T+HOC1NM8e8Ir7wp44KCxSwwG
    /nfhddGREctKno0JUuWBA1uu4m5M9b8pWDmMXSlXUMwOadHeE4QTtHfthKeXI8IS
    SCR42MQoe1XvCNX1ficiMM74d82ylmwx3kUuuBEVNK5o7ssYsv3BXACLPosAqGGG
    X6fitzuWfTLV6T6wNppuoq4Isl1Hpk2Nleo1wvfM50E5Xx3VQZtTvDJkSwaEvfuH
    4H9Mzta4DJRsybVYkwAf0nktb91mo64tJPrxBulN9UuEmJEKTnn/sXVNQLvRLHjY
    JlBc55/qPis=
    =caqs
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":60.87,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":39.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.