First published: Tue Mar 09 2021(Updated: )
Security Fix(es):<br><li> Addressed a security issue which can allow a malicious playbook author to elevate to the awx user from outside the isolated environment: CVE-2021-20253</li> <li> Upgraded to a more recent version of autobahn to address CVE-2020-35678.</li> <li> Upgraded to a more recent version of nginx to address CVE-2019-20372.</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Fixed a bug which can intermittently cause access to encrypted Tower settings to fail, resulting in failed job launches.</li> <li> Improved analytics collection to collect the playbook status for all hosts in a playbook run</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ansible |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:0779 is critical due to the potential for privilege escalation vulnerabilities.
To fix RHSA-2021:0779, you should upgrade to the latest version of Red Hat Ansible Tower as specified in the security advisory.
RHSA-2021:0779 addresses the privilege escalation issue linked to CVE-2021-20253 and also upgrades components to resolve CVE-2020-35678.
RHSA-2021:0779 affects Red Hat Ansible Tower.
There is no official workaround for RHSA-2021:0779; the recommended action is to apply the appropriate security updates.