Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.5332 Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update 19 September 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Ansible Automation Platform 2.4 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2023-41164 Original Bulletin: https://access.redhat.com/errata/RHSA-2023:5208 Comment: CVSS (Max): 6.5 CVE-2023-41164 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update Advisory ID: RHSA-2023:5208-01 Product: Red Hat Ansible Automation Platform Advisory URL: https://access.redhat.com/errata/RHSA-2023:5208 Issue date: 2023-09-18 CVE Names: CVE-2023-41164 ===================================================================== 1. Summary: An update is now available for Red Hat Ansible Automation Platform 2.4 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Ansible Automation Platform 2.4 for RHEL 8 - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Ansible Automation Platform 2.4 for RHEL 9 - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Security Fix(es): * python3-django/python39-django: Potential denial of service vulnerability in django.utils.encoding.uri_to_iri() (CVE-2023-41164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional changes: * ansible-core has been updated to 2.15.4 (AAP-16010) * ansible-runner has been updated to 2.3.4 (AAP-15594) * automation-controller has been updated to 4.4.4 (AAP-15594) * python3-django/python39-django has been updated to 3.2.21 (AAP-15704) Updates and fixes for automation controller: * Fixed job error handling so that we correctly report error text from ansible-runner or receptor in cases we previously showed "Job terminated due to error" (AAP-12917) * The constructed inventory edit form no longer hangs indefinitely in the loading state for users with edit permissions (AAP-15099) * Added views for a monthly summary of host metrics (AAP-15677) * Added host metrics to exported analytics data (AAP-15677) * Introduced a periodic task and management command for cleaning up old host metrics (AAP-15677) * Fixed bug where rapidly clicking on launch button in preview step would launch multiple jobs (AAP-15689) * Fixed incorrect capacity for remote execution nodes when resource limits are set in OpenShift (AAP-15736) 4. Solution: Red Hat Ansible Automation Platform 5. Bugs fixed (https://bugzilla.redhat.com/): 2237258 - CVE-2023-41164 python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()`` 6. Package List: Red Hat Ansible Automation Platform 2.4 for RHEL 8: Source: ansible-core-2.15.4-1.el8ap.src.rpm ansible-runner-2.3.4-1.el8ap.src.rpm automation-controller-4.4.4-1.el8ap.src.rpm python3x-django-3.2.21-1.el8ap.src.rpm aarch64: automation-controller-4.4.4-1.el8ap.aarch64.rpm automation-controller-venv-tower-4.4.4-1.el8ap.aarch64.rpm noarch: ansible-core-2.15.4-1.el8ap.noarch.rpm ansible-runner-2.3.4-1.el8ap.noarch.rpm ansible-test-2.15.4-1.el8ap.noarch.rpm automation-controller-cli-4.4.4-1.el8ap.noarch.rpm automation-controller-server-4.4.4-1.el8ap.noarch.rpm automation-controller-ui-4.4.4-1.el8ap.noarch.rpm python39-ansible-runner-2.3.4-1.el8ap.noarch.rpm python39-django-3.2.21-1.el8ap.noarch.rpm ppc64le: automation-controller-4.4.4-1.el8ap.ppc64le.rpm automation-controller-venv-tower-4.4.4-1.el8ap.ppc64le.rpm s390x: automation-controller-4.4.4-1.el8ap.s390x.rpm automation-controller-venv-tower-4.4.4-1.el8ap.s390x.rpm x86_64: automation-controller-4.4.4-1.el8ap.x86_64.rpm automation-controller-venv-tower-4.4.4-1.el8ap.x86_64.rpm Red Hat Ansible Automation Platform 2.4 for RHEL 8: Source: ansible-core-2.15.4-1.el8ap.src.rpm ansible-runner-2.3.4-1.el8ap.src.rpm noarch: ansible-core-2.15.4-1.el8ap.noarch.rpm ansible-runner-2.3.4-1.el8ap.noarch.rpm python39-ansible-runner-2.3.4-1.el8ap.noarch.rpm Red Hat Ansible Automation Platform 2.4 for RHEL 8: Source: ansible-core-2.15.4-1.el8ap.src.rpm ansible-runner-2.3.4-1.el8ap.src.rpm noarch: ansible-core-2.15.4-1.el8ap.noarch.rpm ansible-runner-2.3.4-1.el8ap.noarch.rpm python39-ansible-runner-2.3.4-1.el8ap.noarch.rpm Red Hat Ansible Automation Platform 2.4 for RHEL 9: Source: ansible-core-2.15.4-1.el9ap.src.rpm ansible-runner-2.3.4-1.el9ap.src.rpm automation-controller-4.4.4-1.el9ap.src.rpm python-django-3.2.21-1.el9ap.src.rpm aarch64: automation-controller-4.4.4-1.el9ap.aarch64.rpm automation-controller-venv-tower-4.4.4-1.el9ap.aarch64.rpm noarch: ansible-core-2.15.4-1.el9ap.noarch.rpm ansible-runner-2.3.4-1.el9ap.noarch.rpm ansible-test-2.15.4-1.el9ap.noarch.rpm automation-controller-cli-4.4.4-1.el9ap.noarch.rpm automation-controller-server-4.4.4-1.el9ap.noarch.rpm automation-controller-ui-4.4.4-1.el9ap.noarch.rpm python3-ansible-runner-2.3.4-1.el9ap.noarch.rpm python3-django-3.2.21-1.el9ap.noarch.rpm ppc64le: automation-controller-4.4.4-1.el9ap.ppc64le.rpm automation-controller-venv-tower-4.4.4-1.el9ap.ppc64le.rpm s390x: automation-controller-4.4.4-1.el9ap.s390x.rpm automation-controller-venv-tower-4.4.4-1.el9ap.s390x.rpm x86_64: automation-controller-4.4.4-1.el9ap.x86_64.rpm automation-controller-venv-tower-4.4.4-1.el9ap.x86_64.rpm Red Hat Ansible Automation Platform 2.4 for RHEL 9: Source: ansible-core-2.15.4-1.el9ap.src.rpm ansible-runner-2.3.4-1.el9ap.src.rpm noarch: ansible-core-2.15.4-1.el9ap.noarch.rpm ansible-runner-2.3.4-1.el9ap.noarch.rpm python3-ansible-runner-2.3.4-1.el9ap.noarch.rpm Red Hat Ansible Automation Platform 2.4 for RHEL 9: Source: ansible-core-2.15.4-1.el9ap.src.rpm ansible-runner-2.3.4-1.el9ap.src.rpm noarch: ansible-core-2.15.4-1.el9ap.noarch.rpm ansible-runner-2.3.4-1.el9ap.noarch.rpm python3-ansible-runner-2.3.4-1.el9ap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-41164 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJlCMDBAAoJENzjgjWX9erEnBcP/iQ8KGcnfBTqdsQCJ6I1gWfd QJHuH+RbneS4q675tybTZhtAf1QTGnBBVH6VtEA10nj4EnkUG74zn1RfgKiUL7Wa As6b0FTvv5VK5wWB0IkkZNitJSKo3bMLorCwhBKtDAFSrftojzpHZdn4e3J3f0Vp CCi4MCgKShuTnWXPNhGhBQWfUodtUJ/shIgcnmtDcYwAQDV6h9vgE5Mr6eATqd++ aB8GHhfxw7UFRG3O60WTtz+zfzzl/2IeGIhpnIgnZDbiiw4+OLI14sj4sV02C28z aZjgi3z6BlLQ7MqPFE3aw5wdQv1pzywf38UWY6rGf5wEKA5o9buEO8emlN9+kY11 j2hbtNWwd9kOBJV0QEVGD1SpjymtvaQxpirDcHKHUH6bT5n9cwUFU18KEFetEDgZ opsgFnqYK5b7kj2dXPliB1yKiH09NpZMAbP+ETJ8vh0dkNkpWQWeNaVAR9NfWmeK Wjbi1n7dniMy8jPc3kB1viFxdwnXh71ubTPT/fejaphuTUrkMsNQyDz0DVA7m7Tl GjEhzkI4ypGtFgphForTquekKTvjQY5iPGKs4etkjBcxeQJzN0MJ4ojs3KOcHhXL X9vAJW2tjjduaaC332C0ApdGO2TjmFI7ZiX9iw2ERd6ChgOrYp40CjnpzpZV4Mx5 91s+FbpesEX2H2zQc/bD =5ac+ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZQj4TckNZI30y1K9AQinhg/+M2sYBD6jtImomx4+rhPENl1UrSdnxdCr sbYKhglgZ/UiUmWN8OdqJM2jtFnQuXTArUwHXZuGOxhm7XyjYyhsNfQG72eKF5d+ cikw2FaZOTu12bxzaWrzNB488eb54P/5k7gNr/JZRD+qmpsIBJ2aG7xxfDxJF6tY ZRsLIqzlQCcSRFFlV5EfbABiM4yO1QLQVaTPsDZ4nCVM83W/lILaTpHUnEqq0boQ OSy1cL75pnEDq8XQVakItCKT6Ef6y9W4bw35elOl8v5tsNXfymM3SmBc2e1Li68N cd89jcn2ExMGR0/pRTNE2qx4H7xsGaGyQ71GOqXI5HRROydmyC0hg/gApHFJ/4C2 FzchblZs8N4OXV/pHYxLM6j+tpeFP3rlSmw60vSXUujR2RCDu9mUjIhHaOluHyQq ng2zPKx4nLTWuKkEcMEn0Pp5Nz7QkG7B1Mxbtqb3EZsYmp+Nt/knTKD/b0Lfe9o1 S8gDm+6meBP2DM0kL+XWtanE58YZHoy7Bo9ZX1sc5tyPm69W5OMyJtROWwDxrX/x PUzaQwC7TkVS245lLp+HryVD3Z9OGLTw03tCyxX6EOKoelaLQj+C+h2i3SGQlnqb LyOsGcZ5kYRnk2Uj5bnSfmGG6QXAJNFH8yf1jY3nFtfxjD6g9VVqwEPbb/Cek6Pp NNlNhgCuJUI= =BXE4 -----END PGP SIGNATURE-----