-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update Advisory ID: RHSA-2023:4991-01 Product: Red Hat Ansible Automation Platform Advisory URL: https://access.redhat.com/errata/RHSA-2023:4991 Issue date: 2023-09-06 CVE Names: CVE-2023-40267 ===================================================================== 1. Summary: An update is now available for Red Hat Ansible Automation Platform 2.3 Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Ansible Automation Platform 2.3 for RHEL 8 - x86_64 Red Hat Ansible Automation Platform 2.3 for RHEL 9 - x86_64 3. Description: Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Security Fix(es): * automation-controller: GitPython: Insecure non-multi options in clone and clone_from is not blocked (CVE-2023-40267) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional changes: * ansible-core has been updated to 2.14.9 (AAP-15270) * automation-controller has been updated to 4.3.13 (AAP-15548) * automation controller: Fix bug that can cause a deadlock on shutdown when redis is unavailable. (AAP-14217) 4. Solution: Red Hat Ansible Automation Platform 5. Bugs fixed (https://bugzilla.redhat.com/): 2231474 - CVE-2023-40267 GitPython: Insecure non-multi options in clone and clone_from is not blocked 6. Package List: Red Hat Ansible Automation Platform 2.3 for RHEL 8: Source: ansible-core-2.14.9-1.el8ap.src.rpm automation-controller-4.3.13-1.el8ap.src.rpm x86_64: ansible-core-2.14.9-1.el8ap.x86_64.rpm ansible-test-2.14.9-1.el8ap.x86_64.rpm automation-controller-4.3.13-1.el8ap.x86_64.rpm automation-controller-cli-4.3.13-1.el8ap.x86_64.rpm automation-controller-server-4.3.13-1.el8ap.x86_64.rpm automation-controller-ui-4.3.13-1.el8ap.x86_64.rpm automation-controller-venv-tower-4.3.13-1.el8ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 8: Source: ansible-core-2.14.9-1.el8ap.src.rpm x86_64: ansible-core-2.14.9-1.el8ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 8: Source: ansible-core-2.14.9-1.el8ap.src.rpm x86_64: ansible-core-2.14.9-1.el8ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 8: Source: ansible-core-2.14.9-1.el8ap.src.rpm x86_64: ansible-core-2.14.9-1.el8ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 9: Source: ansible-core-2.14.9-1.el9ap.src.rpm automation-controller-4.3.13-1.el9ap.src.rpm x86_64: ansible-core-2.14.9-1.el9ap.x86_64.rpm ansible-test-2.14.9-1.el9ap.x86_64.rpm automation-controller-4.3.13-1.el9ap.x86_64.rpm automation-controller-cli-4.3.13-1.el9ap.x86_64.rpm automation-controller-server-4.3.13-1.el9ap.x86_64.rpm automation-controller-ui-4.3.13-1.el9ap.x86_64.rpm automation-controller-venv-tower-4.3.13-1.el9ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 9: Source: ansible-core-2.14.9-1.el9ap.src.rpm x86_64: ansible-core-2.14.9-1.el9ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 9: Source: ansible-core-2.14.9-1.el9ap.src.rpm x86_64: ansible-core-2.14.9-1.el9ap.x86_64.rpm Red Hat Ansible Automation Platform 2.3 for RHEL 9: Source: ansible-core-2.14.9-1.el9ap.src.rpm x86_64: ansible-core-2.14.9-1.el9ap.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-40267 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk+M4JAAoJENzjgjWX9erEsLkQAIva1tmZHlZWhD+C7c2QDiJw b38rDl0T1ltvk+cG/FQ+471pANMromvRalKsvymnwk92WgnOP7BXGFCA04ZLus0I rLu9pyqPSOcMHzLWoJsXd+0W2ViEx54kqQUFBomIK7ThDmaiqG9eeJY1//b+4+Q2 0Pv5ho2Ig6MNvJv8t9DXJ+GSWRvb2q0CzDRxH1KOORrCqVWpP8oslOJPt+HFzJ+p zzvg6IsxNKdQXunnjLHyXkqWfIdTtJppjh6tdUTsANx85COlFYH2Bz2X5rqPq0bH PM07TuUWyoG3obYnvapubqs4w55iykObxiYC1jXXB4VnIMZTah/ZsZDDAa9c3Y+F q3QAhASYf7E74i14QRgkvp85IJdxg3FoKjX5npQXZ1UpQ/sZy7ZXNqyC4d/aVw2M iQGGMbsHQycMZGPySYzL0UjUmcmjLTMZh/obSmk3qV6S1Q0JcngU3LfxMB+IRs0E yzENXxzOUq6lnMpabTR71Na9enmWcmIPDyJUJZp21bk0usXgO7s7T3Ivrc7ZAwPt GFu6Kkgann1AjjMD73J8Xoh7HbOv37OWa+/oDFKerml1rai+mSKpcPtCJMZEeHs5 3QnOCr2utXBDPB4kKffBZup9DkayHQbrBcicNNLAMj6lP1P7uXf6mOUjnLhskWTv hADRKnSL1tPp3u0zE7yH =jKDd -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce