RedHat: RHSA-2020-0216:01 Moderate: Ansible security and bug fix update

    Date 23 Jan 2020
    461
    Posted By LinuxSecurity Advisories
    An update for ansible is now available for Ansible Engine 2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: Ansible security and bug fix update (2.8.8)
    Advisory ID:       RHSA-2020:0216-01
    Product:           Red Hat Ansible Engine
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0216
    Issue date:        2020-01-23
    CVE Names:         CVE-2019-14904 CVE-2019-14905 
    =====================================================================
    
    1. Summary:
    
    An update for ansible is now available for Ansible Engine 2.8
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Ansible Engine 2.8 for RHEL 7 Server - noarch
    Red Hat Ansible Engine 2.8 for RHEL 8 - noarch
    
    3. Description:
    
    Ansible is a simple model-driven configuration management, multi-node
    deployment, and remote-task execution system. Ansible works over SSH and
    does not require any software or daemons to be installed on remote nodes.
    Extension modules can be written in any language and are transferred to
    managed machines automatically.
    
    The following packages have been upgraded to a newer upstream version:
    ansible (2.8.8)
    
    Bug Fix(es):
    * CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted
    solaris zone
    * CVE-2019-14905 Ansible: malicious code could craft filename in
    nxos_file_copy module
    
    See:
    https://github.com/ansible/ansible/blob/v2.8.8/changelogs/CHANGELOG-v2.8.rs
    t
    for details on bug fixes in this release.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1776943 - CVE-2019-14905 Ansible: malicious code could craft filename in nxos_file_copy module
    1776944 - CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted solaris zone
    
    6. Package List:
    
    Red Hat Ansible Engine 2.8 for RHEL 7 Server:
    
    Source:
    ansible-2.8.8-1.el7ae.src.rpm
    
    noarch:
    ansible-2.8.8-1.el7ae.noarch.rpm
    
    Red Hat Ansible Engine 2.8 for RHEL 8:
    
    Source:
    ansible-2.8.8-1.el8ae.src.rpm
    
    noarch:
    ansible-2.8.8-1.el8ae.noarch.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-14904
    https://access.redhat.com/security/cve/CVE-2019-14905
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXinOv9zjgjWX9erEAQgQyg/9GRGYvX5iarvKjN1hrePlWvz9ldkp7QGy
    5+uZ1HgjaLVV62etfzPQAvnYM5OUGQgowMV/xEbMQjSLkMx/Mfc56DC/TGZbaeWR
    pSUxROWAdF8XvbTa6WokCz69jJ3wakogPzuE14aYfDAdnbHCbSfnJJcNe9jWMgWf
    dWY5xDeUNG+Cg7dwtU288/aN7d/zRm/VtIr+flpxx3TkoHNtWQEHwSTgZ7z9UOM8
    IQOHonJUX75FrC6D126j9AhuTxV6bb/PdUv8CBBqdY9Uybc3pbiMtHziNUNB4lyG
    AxmBJmR55NgYbnZ8d1dIUpULCsDUEnBFqpQNBx29xLPcyXiX9g6WvbFrMwWFImnO
    ZeatPV78/LYxjLgjQdacmz/ofcK3XE9u/SU3HpE058nuqUYIF8U96nikzhxmlT0A
    izrJeCnrriZp7OZb4bXbPZ19VINhGiCW9NJnFpP7oWUXHank68zE7Cr9P1QQojYV
    AWeQveiJoAGzZaQt+K2GIGjwjjlvPyulnUQchZSGf9JZyVWrIxiQzB+iNzBHbcKc
    RHNeuctWXa6Lq9SPRRjcbLwRxS2kvGtE9l+Qj5ZQ5/UEVVrpWkC3LI2J6IYc254O
    pZUzLin6z5KsMpCX4sf2W7ZNuxmwfMEO+NlIIfAMKqotk6p3EEy9ZY3tVyHmuxIo
    9FccAHw9JEs=
    =56iA
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":60.87,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":39.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.