-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: [ansible] security update Advisory ID: RHSA-2018:3460-01 Product: Red Hat Ansible Engine Advisory URL: https://access.redhat.com/errata/RHSA-2018:3460 Issue date: 2018-11-05 CVE Names: CVE-2018-16837 ===================================================================== 1. Summary: An update for ansible is now available for Ansible Engine 2.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Ansible Engine 2.6 for RHEL 7 Server - noarch 3. Description: Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. The following packages have been upgraded to a newer upstream version: ansible (2.6.7) Security fix(es): * ansible: Information leak in "user" module (CVE-2018-16837) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Markus Teufelberger (mgIT Consulting) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1640642 - CVE-2018-16837 Ansible: Information leak in "user" module 6. Package List: Red Hat Ansible Engine 2.6 for RHEL 7 Server: Source: ansible-2.6.7-1.el7ae.src.rpm noarch: ansible-2.6.7-1.el7ae.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-16837 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW+Ahq9zjgjWX9erEAQhA+Q//UX2AjgnT4nlmjxy5xh1ikmJu8nTUWI71 0KnX61OfqeYvpnHAYOyCKMJU0oaF3FaHTFB+ISnz8c13Lk7Uvpb6tnpw2K7BcJr3 v45GrMo6RRQxFrZ+ASJg6VuHC46MLP7dnrfMVo+OkEp3GeHhASYQyDx4AucZQsjM Vi9Kr2FNgH41zbX0sSeGH0vobZxC9AW7Q5zsk+85L+1v5FTAIjL3V67JIQEO0jn5 W2V+mCRtwx3k1kGXn4IHVs1UL7SLDOqSxou3rP4yA+/fYPpfDkTs182TcOVWEIBf XEWFzrg2yiCthGYeKgMwEwdui1DI2+Y3O89W2O1SLgnYxVAPkG+Nxhs46GzcvVQE q4vszSZGhbcRoMMv/7Zl12OvkIqhx/ggw7f4mQivo5WWHRvdfnKol4qu9glMXLMJ J3THe1LA+7GFle0kLVbSTxNQG96l+cg00AvI5HwvG/1J0tvzbjwSL+ZrW1CN+pYO yC7Jbr+sCRkq3OV1G10zfFua2dgWphTiHd0hf/Bbczg5Qvk41CiBS6yqgZGacWcZ y6/dybzS8jUD9qJPFwRWXu99xjqB6HHmdhs1D69ySH5y8WTbRb2KQ6y//Bt2XRjF XE58R9Arz70HeX2gHKIxY/crSdoW30Y9NCDWXarBGUzHT+sBKt39EoWe/OI6Z4iZ 6ECzxPRwMqA= =ujKp -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce