RedHat: RHSA-2020-0218:01 Moderate: Ansible security and bug fix update

    Date 23 Jan 2020
    510
    Posted By LinuxSecurity Advisories
    An update for ansible is now available for Ansible Engine 2 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: Ansible security and bug fix update (2.9.4)
    Advisory ID:       RHSA-2020:0218-01
    Product:           Red Hat Ansible Engine
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0218
    Issue date:        2020-01-23
    CVE Names:         CVE-2019-14904 CVE-2019-14905 
    =====================================================================
    
    1. Summary:
    
    An update for ansible is now available for Ansible Engine 2
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Ansible Engine 2 for RHEL 7 - noarch
    Red Hat Ansible Engine 2 for RHEL 8 - noarch
    
    3. Description:
    
    Ansible is a simple model-driven configuration management, multi-node
    deployment, and remote-task execution system. Ansible works over SSH and
    does not require any software or daemons to be installed on remote nodes.
    Extension modules can be written in any language and are transferred to
    managed machines automatically.
    
    The following packages have been upgraded to a newer upstream version:
    ansible (2.9.4)
    
    Bug Fix(es):
    * CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted
    solaris zone
    * CVE-2019-14905 Ansible: malicious code could craft filename in
    nxos_file_copy module
    
    See:
    https://github.com/ansible/ansible/blob/v2.9.4/changelogs/CHANGELOG-v2.9.rs
    t
    for details on bug fixes in this release.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1776943 - CVE-2019-14905 Ansible: malicious code could craft filename in nxos_file_copy module
    1776944 - CVE-2019-14904 Ansible: vulnerability in solaris_zone module via crafted solaris zone
    
    6. Package List:
    
    Red Hat Ansible Engine 2 for RHEL 7:
    
    Source:
    ansible-2.9.4-1.el7ae.src.rpm
    
    noarch:
    ansible-2.9.4-1.el7ae.noarch.rpm
    ansible-test-2.9.4-1.el7ae.noarch.rpm
    
    Red Hat Ansible Engine 2 for RHEL 8:
    
    Source:
    ansible-2.9.4-1.el8ae.src.rpm
    
    noarch:
    ansible-2.9.4-1.el8ae.noarch.rpm
    ansible-test-2.9.4-1.el8ae.noarch.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-14904
    https://access.redhat.com/security/cve/CVE-2019-14905
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXinOztzjgjWX9erEAQhxyQ//cRlLa9Ms7Dyk/LRGYXEpLaO3f1cZ7FEQ
    B7IGTcTpvzb+aTpJJRnPe+qIqn9iJWTpWwP4pfPoOzSMc/pZxClBikD9VJpriBlk
    +rxqmyBGGlZKaIRCJtUvhPNePzdXv1QtUN0/zvA1VV31ie62nEQm8LrFoHAJDjJE
    kHj06Ghyy8PhwraLR59S0moKEYF2bUDSEgJ0o/v7KAJx8/Aan85tII5/G+DZAGKy
    sW57vxT20oZKswuUYPibSgWGp/3x2ynv3tT3uLFwwWo4hne13qEfUjfGKPihMzLm
    17xeqe/Kabbt9+tv3g734DBpw1Dz0OHuXnwoFrrT9f7z+GuvEW8FlwGr9DUqlkFL
    MykvWRVN2mMQBXXnzK/KGlNIkhHez7KfiEblhCR/GRwWTUsqU6R+DI8wnHqc+cOF
    4rPWXSdgro5zG3Gt3wH00YsuYsZjbNagTv56AzUkYi1rx9I/kElabkhxz8lRPprx
    4Z/nONA6gBeBFazX3d9iazsE6dW5njEdnFklLjcDbk8C8NwvNdn7Ol+rr6yKjWK1
    mMVyYQfZy6pnToVLqD+4pxvQ+APc/7qhC8Xk2XTFdHf/Mn1nVs3VW6rASkbxCJo6
    RxsdlaQNzN+Fa2kY83yA5ZHJ6wScod2ZpSb4IzB4BR8on9r76jjXPHSGRog1z6Tz
    EtATCYIqACE=
    =wzZ/
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":60.87,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":39.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.