A Red Hat Ansible Automation Platform 2.1.3 security and bug fix update has been released.
RHSA-2022:6078-01: Important: Red Hat Ansible Automation Platform 2.1.3 security and bug fix update
=====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat Ansible Automation Platform 2.1.3 security and bug fix update
Advisory ID: RHSA-2022:6078-01
Product: Red Hat Ansible Automation Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6078
Issue date: 2022-08-16
CVE Names: CVE-2022-2568
=====================================================================
1. Summary:
An update is now available for Red Hat Ansible Automation Platform 2.1
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Ansible Automation Platform 2.1 for RHEL 8 - noarch, x86_64
3. Description:
Red Hat Ansible Automation Platform provides an enterprise framework for
building, deploying and managing IT automation at scale. IT Managers can
provide top-down guidelines on how automation is applied to individual
teams, while automation developers retain the freedom to write tasks that
leverage existing knowledge without the overhead. Ansible Automation
Platform makes it possible for users across an organization to share, vet,
and manage automation content by means of a simple, powerful, and agentless
language.
Security Fix(es):
* automation hub: Ansible: Logic flaw leads to privilege escalation
(CVE-2022-2568)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Red Hat Ansible Automation Platform
5. Bugs fixed ( https://bugzilla.redhat.com/):
2108653 - CVE-2022-2568 Ansible: Logic flaw leads to privilage escalation
6. Package List:
Red Hat Ansible Automation Platform 2.1 for RHEL 8:
Source:
ansible-core-2.12.7-2.el8ap.src.rpm
automation-controller-4.1.3-2.el8ap.src.rpm
automation-hub-4.4.4-1.el8pc.src.rpm
openshift-clients-4.10.0-202206211856.p0.g45460a5.assembly.stream.el8.src.rpm
pulpcore-selinux-1.3.2-1.el8ap.src.rpm
python-galaxy-ng-4.4.4-1.el8pc.src.rpm
noarch:
automation-hub-4.4.4-1.el8pc.noarch.rpm
python38-galaxy-ng-4.4.4-1.el8pc.noarch.rpm
x86_64:
ansible-core-2.12.7-2.el8ap.x86_64.rpm
ansible-test-2.12.7-2.el8ap.x86_64.rpm
automation-controller-4.1.3-2.el8ap.x86_64.rpm
automation-controller-cli-4.1.3-2.el8ap.x86_64.rpm
automation-controller-server-4.1.3-2.el8ap.x86_64.rpm
automation-controller-ui-4.1.3-2.el8ap.x86_64.rpm
automation-controller-venv-tower-4.1.3-2.el8ap.x86_64.rpm
openshift-clients-4.10.0-202206211856.p0.g45460a5.assembly.stream.el8.x86_64.rpm
pulpcore-selinux-1.3.2-1.el8ap.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-2568
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.