-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Ansible Automation Platform 1.2.2 security and bug fix update Advisory ID: RHSA-2021:0781-01 Product: Red Hat Ansible Automation Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:0781 Issue date: 2021-03-09 CVE Names: CVE-2020-7789 CVE-2020-15366 CVE-2021-3281 CVE-2021-20270 ==================================================================== 1. Summary: An update is now available for Red Hat Ansible Automation Platform 1.2.2. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Automation Hub 4.2 for RHEL 7 - noarch Red Hat Automation Hub 4.2 for RHEL 8 - noarch 3. Description: Red Hat Ansible Automation Platform integrates Red Hat's automation suite consisting of Red Hat Ansible Tower, Red Hat Ansible Engine, Automation Hub and use-case specific capabilities for Microsoft Windows, network, security, and more, along with Software-as-a-Service (SaaS)-based capabilities and features for organization-wide effectiveness. This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. Security Fix(es): * node-notifier: nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array (CVE-2020-7789) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * django: Potential directory-traversal via archive.extract() (CVE-2021-3281) * python-pygments: infinite loop in SML lexer may lead to DoS (CVE-2021-20270) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function 1906853 - CVE-2020-7789 nodejs-node-notifier: command injection due to the options params not being sanitised when being passed an array 1919969 - CVE-2021-3281 django: Potential directory-traversal via archive.extract() 1922136 - CVE-2021-20270 python-pygments: infinite loop in SML lexer may lead to DoS 6. Package List: Red Hat Automation Hub 4.2 for RHEL 7: Source: automation-hub-4.2.2-1.el7pc.src.rpm python-bleach-3.3.0-1.el7pc.src.rpm python-bleach-allowlist-1.0.3-1.el7pc.src.rpm python-galaxy-importer-0.2.15-1.el7pc.src.rpm python-galaxy-ng-4.2.2-1.el7pc.src.rpm python-pulp-ansible-0.5.6-1.el7pc.src.rpm noarch: automation-hub-4.2.2-1.el7pc.noarch.rpm python3-bleach-3.3.0-1.el7pc.noarch.rpm python3-bleach-allowlist-1.0.3-1.el7pc.noarch.rpm python3-django-2.2.18-1.el7pc.noarch.rpm python3-galaxy-importer-0.2.15-1.el7pc.noarch.rpm python3-galaxy-ng-4.2.2-1.el7pc.noarch.rpm python3-pulp-ansible-0.5.6-1.el7pc.noarch.rpm Red Hat Automation Hub 4.2 for RHEL 8: Source: automation-hub-4.2.2-1.el8pc.src.rpm python-bleach-3.3.0-1.el8pc.src.rpm python-bleach-allowlist-1.0.3-1.el8pc.src.rpm python-galaxy-importer-0.2.15-1.el8pc.src.rpm python-galaxy-ng-4.2.2-1.el8pc.src.rpm python-pulp-ansible-0.5.6-1.el8pc.src.rpm noarch: automation-hub-4.2.2-1.el8pc.noarch.rpm python3-bleach-3.3.0-1.el8pc.noarch.rpm python3-bleach-allowlist-1.0.3-1.el8pc.noarch.rpm python3-django-2.2.18-1.el8pc.noarch.rpm python3-galaxy-importer-0.2.15-1.el8pc.noarch.rpm python3-galaxy-ng-4.2.2-1.el8pc.noarch.rpm python3-pulp-ansible-0.5.6-1.el8pc.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-7789 https://access.redhat.com/security/cve/CVE-2020-15366 https://access.redhat.com/security/cve/CVE-2021-3281 https://access.redhat.com/security/cve/CVE-2021-20270 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYEeRutzjgjWX9erEAQgsPhAAhE7hJ26KLxiGl0uN9EGITswooI9PspgS oSQyf1Sf8TeMMm3gLeJxqkHRtyRDI92o4OThM/aqJ6AX6I4jZHxKgi/TQj6wY36v bPo+8h8R1lLBhEVumv2IdmG8glPwBEIszGHBrRFnUQSUdJpeCopN4Jlj3aip4Vgn y1KZZk0nRVCZpPrZrZwNVJwT/n/T8m5qrzfRgXNdskXENyJs65NMaA2FlOVWsEBs KjG04sqLC/OH7D32kBzZaLIDhQCSmaifxIYBoZiJfVU/iEgJTtUhSuVAQr9HsLYL fr1Q37s+dbZXTJMX0BJxPeyDGHS+3L3PhKG7mpQCDX2kHBuctTlIPIWUKb2LHILn u3NPRJwL/SQUardXtBZ/eZ+aP4nviWrCaFrwsNo+1TJsEkRP7NHIdi2SZe8TZIcL a0GFQSkvvxO+lxreC5ZkjJ8qOCJumDPfJO9ZstJHbV8I1mxjcYf+g7+KFQkzc78Z z7TRvk2Rri5uOUmdvzclrGa5j4c2zUfYdygRW00s5XSBXsyLzD9tSBl20Gx6rdPC iOllgfydf+izFUGTl4s1rIYiBWItazEoVj4BlJf7Fw9sovasIOD4Ufkx0H0ArtAA /9lgOabuUyUxjC3d1itQk/jDlyJiQKFMH2hOJe9BT1Yh+rBoJi4x8NorAUlL8OWM chJjhTMkKRU=qIKJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce