A Red Hat Ansible Automation Platform 1.2.2 security and bug fix update has been released.
RHSA-2021:0781-01: Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update
Advisory ID: RHSA-2021:0781-01
Product: Red Hat Ansible Automation Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0781
Issue date: 2021-03-09
CVE Names: CVE-2020-7789 CVE-2020-15366 CVE-2021-3281
CVE-2021-20270
=====================================================================
1. Summary:
An update is now available for Red Hat Ansible Automation Platform 1.2.2.
Red Hat Product Security has rated this update as having a security impact
of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE
link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Automation Hub 4.2 for RHEL 7 - noarch
Red Hat Automation Hub 4.2 for RHEL 8 - noarch
3. Description:
Red Hat Ansible Automation Platform integrates Red Hat's automation suite
consisting of Red Hat Ansible Tower, Red Hat Ansible Engine, Automation Hub
and use-case specific capabilities for Microsoft Windows, network,
security, and more, along with Software-as-a-Service (SaaS)-based
capabilities and features for organization-wide effectiveness.
This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.
Security Fix(es):
* node-notifier: nodejs-node-notifier: command injection due to the options
params not being sanitised when being passed an array (CVE-2020-7789)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate
function (CVE-2020-15366)
* django: Potential directory-traversal via archive.extract()
(CVE-2021-3281)
* python-pygments: infinite loop in SML lexer may lead to DoS
(CVE-2021-20270)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed ( https://bugzilla.redhat.com/):
1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
1906853 - CVE-2020-7789 nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array
1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract()
1922136 - CVE-2021-20270 python-pygments: infinite loop in SML lexer may lead to DoS
6. Package List:
Red Hat Automation Hub 4.2 for RHEL 7:
Source:
automation-hub-4.2.2-1.el7pc.src.rpm
python-bleach-3.3.0-1.el7pc.src.rpm
python-bleach-allowlist-1.0.3-1.el7pc.src.rpm
python-galaxy-importer-0.2.15-1.el7pc.src.rpm
python-galaxy-ng-4.2.2-1.el7pc.src.rpm
python-pulp-ansible-0.5.6-1.el7pc.src.rpm
noarch:
automation-hub-4.2.2-1.el7pc.noarch.rpm
python3-bleach-3.3.0-1.el7pc.noarch.rpm
python3-bleach-allowlist-1.0.3-1.el7pc.noarch.rpm
python3-django-2.2.18-1.el7pc.noarch.rpm
python3-galaxy-importer-0.2.15-1.el7pc.noarch.rpm
python3-galaxy-ng-4.2.2-1.el7pc.noarch.rpm
python3-pulp-ansible-0.5.6-1.el7pc.noarch.rpm
Red Hat Automation Hub 4.2 for RHEL 8:
Source:
automation-hub-4.2.2-1.el8pc.src.rpm
python-bleach-3.3.0-1.el8pc.src.rpm
python-bleach-allowlist-1.0.3-1.el8pc.src.rpm
python-galaxy-importer-0.2.15-1.el8pc.src.rpm
python-galaxy-ng-4.2.2-1.el8pc.src.rpm
python-pulp-ansible-0.5.6-1.el8pc.src.rpm
noarch:
automation-hub-4.2.2-1.el8pc.noarch.rpm
python3-bleach-3.3.0-1.el8pc.noarch.rpm
python3-bleach-allowlist-1.0.3-1.el8pc.noarch.rpm
python3-django-2.2.18-1.el8pc.noarch.rpm
python3-galaxy-importer-0.2.15-1.el8pc.noarch.rpm
python3-galaxy-ng-4.2.2-1.el8pc.noarch.rpm
python3-pulp-ansible-0.5.6-1.el8pc.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-7789
https://access.redhat.com/security/cve/CVE-2020-15366
https://access.redhat.com/security/cve/CVE-2021-3281
https://access.redhat.com/security/cve/CVE-2021-20270
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.