- Issued:
- 2021-03-09
- Updated:
- 2021-03-09
RHSA-2021:0781 - Security Advisory
Synopsis
Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update is now available for Red Hat Ansible Automation Platform 1.2.2.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
Red Hat Ansible Automation Platform integrates Red Hat's automation suite consisting of Red Hat Ansible Tower, Red Hat Ansible Engine, Automation Hub and use-case specific capabilities for Microsoft Windows, network, security, and more, along with Software-as-a-Service (SaaS)-based capabilities and features for organization-wide effectiveness.
This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.
Security Fix(es):
- node-notifier: nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array (CVE-2020-7789)
- nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
- django: Potential directory-traversal via archive.extract() (CVE-2021-3281)
- python-pygments: infinite loop in SML lexer may lead to DoS (CVE-2021-20270)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Ansible Automation Platform 1.2 for RHEL 8 x86_64
- Red Hat Ansible Automation Platform 1.2 for RHEL 7 x86_64
Fixes
- BZ - 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
- BZ - 1906853 - CVE-2020-7789 nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array
- BZ - 1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract()
- BZ - 1922136 - CVE-2021-20270 python-pygments: infinite loop in SML lexer may lead to DoS
Red Hat Ansible Automation Platform 1.2 for RHEL 8
SRPM | |
---|---|
automation-hub-4.2.2-1.el8pc.src.rpm | SHA-256: 9e1d3658393817b5a2d3cc802c9d408e9290aece51a8708edcfec9882edbc072 |
python-bleach-3.3.0-1.el8pc.src.rpm | SHA-256: 4a9a59b9a90d3e5ef2c4ce222fdf3f6e8039a84c9bd7d3548bce654c94084e95 |
python-bleach-allowlist-1.0.3-1.el8pc.src.rpm | SHA-256: 34dbf839e5a1850f0635182b687fe82165745a25f9e11f55fd4d5b7951041514 |
python-galaxy-importer-0.2.15-1.el8pc.src.rpm | SHA-256: 987c059d0ee690106ea233251fd2c09474595fcf61f3f4778c946f4f3004b717 |
python-galaxy-ng-4.2.2-1.el8pc.src.rpm | SHA-256: 7e064e18888eca80e3426a2448ac7b2536a1691adec00650a3b7a3f7f9d3ae3e |
python-pulp-ansible-0.5.6-1.el8pc.src.rpm | SHA-256: c68eb3193264c55d99fa523424545dec50a737e55763c035899eccbd86804032 |
x86_64 | |
automation-hub-4.2.2-1.el8pc.noarch.rpm | SHA-256: 8d218033a371a44ba5e48ba93407616722032925664c30be7d4b09abb05cee48 |
python3-bleach-3.3.0-1.el8pc.noarch.rpm | SHA-256: c6bd4d0bb2c8afd4a2ffdf18e50436bb6b86b760cf39190a4e2e2fe055781183 |
python3-bleach-allowlist-1.0.3-1.el8pc.noarch.rpm | SHA-256: 341a1c176240ed1ff5fd7c555d5f015fad828cfcd3b0d837305820ca58baebe4 |
python3-django-2.2.18-1.el8pc.noarch.rpm | SHA-256: 4e87800b09c82f55a443945d34946569e81593e36f89ecf0c02ecce864450de9 |
python3-galaxy-importer-0.2.15-1.el8pc.noarch.rpm | SHA-256: 58ae521b94fc6b78fc5abe52837542ac368195bad43a3834d5b86304d7e08c28 |
python3-galaxy-ng-4.2.2-1.el8pc.noarch.rpm | SHA-256: 4d7673c819205b707dbe67fa83c9b233ec93f63406aef5eab36e2405b8400c0b |
python3-pulp-ansible-0.5.6-1.el8pc.noarch.rpm | SHA-256: d2053fe5cfb5fd290dbbea81a36bae2e3703b8b264276077e987084ad807d2d6 |
Red Hat Ansible Automation Platform 1.2 for RHEL 7
SRPM | |
---|---|
automation-hub-4.2.2-1.el7pc.src.rpm | SHA-256: 5f26dc64c968a0ae07d057234b78c3e8afe6cf251d5df8a97912bd6cc219a071 |
python-bleach-3.3.0-1.el7pc.src.rpm | SHA-256: 9b60b74cbf07e2e0caec3eb26cedb86c934e2f81191c9af5d7c350a90c6ecd32 |
python-bleach-allowlist-1.0.3-1.el7pc.src.rpm | SHA-256: de1370694e893526933e26310d2b33b6fa5d0bb9288be1ecfa35e6050e8a43df |
python-galaxy-importer-0.2.15-1.el7pc.src.rpm | SHA-256: 3e4695fb2b6beba25d7e28f6ea3acd4add2fd35a33f5ca3de5afb02917bceb56 |
python-galaxy-ng-4.2.2-1.el7pc.src.rpm | SHA-256: ebba8d51d618558496d612b1efacc82e97c06361fea99e495999a22def90587e |
python-pulp-ansible-0.5.6-1.el7pc.src.rpm | SHA-256: a441f625da1286bc7bd1c48a2f42bd36da8d65513e95eec7745fadfc49c5b024 |
x86_64 | |
automation-hub-4.2.2-1.el7pc.noarch.rpm | SHA-256: 1c9c0b6c897a72b0d24003c61a9b0701f79859224bb4ac28ae135ba627ee0663 |
python3-bleach-3.3.0-1.el7pc.noarch.rpm | SHA-256: 327af6824b269da80dcfd6b98bb7ff2c7cb6bf690dddbe255673642acfbaad3d |
python3-bleach-allowlist-1.0.3-1.el7pc.noarch.rpm | SHA-256: 1e0ed276372310efb0548a4ce232aad3fa21a5923bd268c526ff4e1bc032a202 |
python3-django-2.2.18-1.el7pc.noarch.rpm | SHA-256: f1805393ee0ea3548150769375c7244c4b4793b5b4cc55d88464788d8a0ef304 |
python3-galaxy-importer-0.2.15-1.el7pc.noarch.rpm | SHA-256: 45a86603fb919b00bac194560a625d2dd5eef941cd8ac4920845fc9772741091 |
python3-galaxy-ng-4.2.2-1.el7pc.noarch.rpm | SHA-256: ab7c886bcef9d6b18044c7531798c860a29e1fb4823a00bb1b611c396a7f4784 |
python3-pulp-ansible-0.5.6-1.el7pc.noarch.rpm | SHA-256: 49853a0ccaeb78f323042a22be98e8a39319026273ec5226cd09ce6555038b89 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.