[RHSA-2021:0781-01] Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Tue Mar 9 15:18:23 UTC 2021


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update
Advisory ID:       RHSA-2021:0781-01
Product:           Red Hat Ansible Automation Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0781
Issue date:        2021-03-09
CVE Names:         CVE-2020-7789 CVE-2020-15366 CVE-2021-3281 
                   CVE-2021-20270 
=====================================================================

1. Summary:

An update is now available for Red Hat Ansible Automation Platform 1.2.2.

Red Hat Product Security has rated this update as having a security impact
of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Automation Hub 4.2 for RHEL 7 - noarch
Red Hat Automation Hub 4.2 for RHEL 8 - noarch

3. Description:

Red Hat Ansible Automation Platform integrates Red Hat's automation suite
consisting of Red Hat Ansible Tower, Red Hat Ansible Engine, Automation Hub
and use-case specific capabilities for Microsoft Windows, network,
security, and more, along with Software-as-a-Service (SaaS)-based
capabilities and features for organization-wide effectiveness.

This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.

Security Fix(es):

* node-notifier: nodejs-node-notifier: command injection due to the options
params not being sanitised when being passed an array (CVE-2020-7789)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate
function (CVE-2020-15366)
* django: Potential directory-traversal via archive.extract()
(CVE-2021-3281)
* python-pygments: infinite loop in SML lexer may lead to DoS
(CVE-2021-20270)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
1906853 - CVE-2020-7789 nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array
1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract()
1922136 - CVE-2021-20270 python-pygments: infinite loop in SML lexer may lead to DoS

6. Package List:

Red Hat Automation Hub 4.2 for RHEL 7:

Source:
automation-hub-4.2.2-1.el7pc.src.rpm
python-bleach-3.3.0-1.el7pc.src.rpm
python-bleach-allowlist-1.0.3-1.el7pc.src.rpm
python-galaxy-importer-0.2.15-1.el7pc.src.rpm
python-galaxy-ng-4.2.2-1.el7pc.src.rpm
python-pulp-ansible-0.5.6-1.el7pc.src.rpm

noarch:
automation-hub-4.2.2-1.el7pc.noarch.rpm
python3-bleach-3.3.0-1.el7pc.noarch.rpm
python3-bleach-allowlist-1.0.3-1.el7pc.noarch.rpm
python3-django-2.2.18-1.el7pc.noarch.rpm
python3-galaxy-importer-0.2.15-1.el7pc.noarch.rpm
python3-galaxy-ng-4.2.2-1.el7pc.noarch.rpm
python3-pulp-ansible-0.5.6-1.el7pc.noarch.rpm

Red Hat Automation Hub 4.2 for RHEL 8:

Source:
automation-hub-4.2.2-1.el8pc.src.rpm
python-bleach-3.3.0-1.el8pc.src.rpm
python-bleach-allowlist-1.0.3-1.el8pc.src.rpm
python-galaxy-importer-0.2.15-1.el8pc.src.rpm
python-galaxy-ng-4.2.2-1.el8pc.src.rpm
python-pulp-ansible-0.5.6-1.el8pc.src.rpm

noarch:
automation-hub-4.2.2-1.el8pc.noarch.rpm
python3-bleach-3.3.0-1.el8pc.noarch.rpm
python3-bleach-allowlist-1.0.3-1.el8pc.noarch.rpm
python3-django-2.2.18-1.el8pc.noarch.rpm
python3-galaxy-importer-0.2.15-1.el8pc.noarch.rpm
python3-galaxy-ng-4.2.2-1.el8pc.noarch.rpm
python3-pulp-ansible-0.5.6-1.el8pc.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-7789
https://access.redhat.com/security/cve/CVE-2020-15366
https://access.redhat.com/security/cve/CVE-2021-3281
https://access.redhat.com/security/cve/CVE-2021-20270
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=qIKJ
-----END PGP SIGNATURE-----




More information about the RHSA-announce mailing list