First published: Mon Nov 30 2020(Updated: )
<li> Fixed two jQuery vulnerabilities (CVE-2020-11022, CVE-2020-11023)</li> <li> Improved Ansible Tower's web service configuration to allow for processing more simultaneous HTTP(s) requests by default</li> <li> Updated several dependencies of Ansible Tower's User Interface to address (CVE-2020-7720, CVE-2020-7743, CVE-2020-7676)</li> <li> Updated to the latest version of python-psutil to address CVE-2019-18874</li> <li> Added several optimizations to improve performance for a variety of high-load simultaneous job launch use cases</li> <li> Fixed workflows to no longer prevent certain users from being able to edit approval nodes</li> <li> Fixed confusing behavior for social auth logins across distinct browser tabs</li> <li> Fixed launching of Job Templates that use prompt-at-launch Ansible Vault credentials</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ansible |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2020:5249 addresses two jQuery vulnerabilities identified as CVE-2020-11022 and CVE-2020-11023.
The update improves Ansible Tower's web service configuration to handle more simultaneous HTTP(s) requests by default.
The vulnerabilities fixed in RHSA-2020:5249 could potentially allow for cross-site scripting attacks if left unaddressed.
You can update your Ansible Tower installation by applying the latest security patches provided in RHSA-2020:5249.
RHSA-2020:5249 affects all supported versions of Red Hat Ansible Tower that utilize the patched jQuery libraries.