[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2019:2545-01] Moderate: Ansible security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Ansible security update
Advisory ID:       RHSA-2019:2545-01
Product:           Red Hat Ansible Engine
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2545
Issue date:        2019-08-21
CVE Names:         CVE-2019-10206 
=====================================================================

1. Summary:

An update for Ansible is now available for Ansible Engine 2.6.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ansible Engine 2.6 for RHEL 7 Server - noarch

3. Description:

Ansible is a simple model-driven configuration management, multi-node
deployment, and remote-task execution system. Ansible works over SSH and
does not require any software or daemons to be installed on remote nodes.
Extension modules can be written in any language and are transferred to
managed machines automatically.

The following packages have been upgraded to a newer upstream version:
ansible (2.6.19)

Security fix(es):

* Ansible: data disclosure when a password from the prompt contains
template characters (CVE-2019-10206)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1732623 - CVE-2019-10206 Ansible: disclosure data when prompted for password and template characters are passed

6. Package List:

Red Hat Ansible Engine 2.6 for RHEL 7 Server:

Source:
ansible-2.6.19-1.el7ae.src.rpm

noarch:
ansible-2.6.19-1.el7ae.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-10206
https://access.redhat.com/security/updates/classification/#moderate
https://github.com/ansible/ansible/blob/v2.6.19/changelogs/CHANGELOG-v2.6.rst

8. Contact:

The Red Hat security contact is <secalert redhat com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=5uS5
-----END PGP SIGNATURE-----


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]