First published: Wed Aug 05 2020(Updated: )
<li> Removed reports option for Satellite inventory script</li> <li> Fixed Tower Server Side Request Forgery on Credentials (CVE-2020-14327)</li> <li> Fixed the ``Job Type`` field to render properly when editing a Job Template</li> <li> Fixed a notable delay running large project update clones</li> <li> Fixed Tower to properly sync host facts for Red Hat Satellite 6.7 inventories</li> <li> Fixed installations on Red Hat OpenShift 4.3 to no longer fail</li> <li> Fixed the usage of certain SSH keys on RHEL8 when FIPS is enabled to work properly</li> <li> Fixed upgrades from 3.5 to 3.6 on RHEL8 in order for PostgreSQL client libraries to be upgraded on Tower nodes, which fixes the backup/restore function</li> <li> Fixed credential lookups from CyberArk AIM to no longer fail unexpectedly</li> <li> Fixed the ability to add a user to an organization when they already had roles in the organization</li> <li> Fixed manually added host variables to no longer be removed on VMWare vCenter inventory syncs</li> <li> Fixed a number of issues related to Tower’s reporting of metrics to Red Hat Automation Analytics</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ansible |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:3329 is classified as moderate.
RHSA-2020:3329 addresses a Server Side Request Forgery vulnerability on Credentials (CVE-2020-14327) in Ansible Tower.
To fix RHSA-2020:3329, update your Ansible Tower installation to the latest version as specified in the advisory.
RHSA-2020:3329 affects Red Hat Ansible Tower.
RHSA-2020:3329 includes fixes for Job Template editing and performance enhancements for large project updates.