summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--changelogs/.changes.yaml13
-rw-r--r--changelogs/CHANGELOG-v2.8.rst55
-rw-r--r--changelogs/fragments/v2.8.14_summary.yaml3
-rw-r--r--lib/ansible/release.py2
4 files changed, 65 insertions, 8 deletions
diff --git a/changelogs/.changes.yaml b/changelogs/.changes.yaml
index 7c7da30b04..1b6a443968 100644
--- a/changelogs/.changes.yaml
+++ b/changelogs/.changes.yaml
@@ -1670,6 +1670,19 @@ releases:
- 70261_pipe_lookup.yml
- v2.8.13_summary.yaml
release_date: '2020-07-14'
+ 2.8.14:
+ codename: How Many More Times
+ fragments:
+ - 32386_debconf_password.yml
+ - 67794-atomic_move-default-perms.yml
+ - 67794-default-permissions-warning-fix.yml
+ - 70762-sanitize-uri-keys.yml
+ - ansible-test-pytest-cap.yml
+ - copy-sanitize-check-mode-invocation-args.yaml
+ - rpmfluff-compat-fixes.yml
+ - test-ansible-runner-pin-psutil.yml
+ - v2.8.14_summary.yaml
+ release_date: '2020-08-10'
2.8.2:
codename: How Many More Times
fragments:
diff --git a/changelogs/CHANGELOG-v2.8.rst b/changelogs/CHANGELOG-v2.8.rst
index e6abd32d88..4a5b3669b0 100644
--- a/changelogs/CHANGELOG-v2.8.rst
+++ b/changelogs/CHANGELOG-v2.8.rst
@@ -5,6 +5,39 @@ Ansible 2.8 "How Many More Times" Release Notes
.. contents:: Topics
+v2.8.14
+=======
+
+Release Summary
+---------------
+
+| Release Date: 2020-08-10
+| `Porting Guide <https://docs.ansible.com/ansible/devel/porting_guides.html>`__
+
+
+Minor Changes
+-------------
+
+- debconf - add a note about no_log=True since module might expose sensitive information to logs (https://github.com/ansible/ansible/issues/32386).
+
+Security Fixes
+--------------
+
+- **security issue** - copy - Redact the value of the no_log 'content' parameter in the result's invocation.module_args in check mode. Previously when used with check mode and with '-vvv', the module would not censor the content if a change would be made to the destination path. (CVE-2020-14332)
+
+- **security issue** atomic_move - change default permissions when creating temporary files so they are not world readable (https://github.com/ansible/ansible/issues/67794) (CVE-2020-1736)
+
+- Fix warning for default permission change when no mode is specified. Follow up to https://github.com/ansible/ansible/issues/67794. (CVE-2020-1736)
+
+- Sanitize no_log values from any response keys that might be returned from the uri module (CVE-2020-14330).
+
+Bugfixes
+--------
+
+- Address compat with rpmfluff-0.6 for integration tests
+- add constraints file for ``anisble_runner`` test since an update to ``psutil`` is now causing test failures
+- ansible-test - Add ``pytest < 6.0.0`` constraint for managed installations on Python 3.x to avoid issues with relative imports.
+
v2.8.13
=======
@@ -75,19 +108,23 @@ Removed Features (previously deprecated)
- ldap_attr, ldap_entry - The ``params`` option has been removed in Ansible-2.10 as it circumvents Ansible's option handling. Setting ``bind_pw`` with the ``params`` option was disallowed in Ansible-2.7, 2.8, and 2.9 as it was insecure. For information about this policy, see the discussion at: https://meetbot.fedoraproject.org/ansible-meeting/2017-09-28/ansible_dev_meeting.2017-09-28-15.00.log.html This fixes CVE-2020-1746
-Bugfixes
---------
+Security Fixes
+--------------
- **security issue** - The ``subversion`` module provided the password via the svn command line option ``--password`` and can be retrieved from the host's /proc/<pid>/cmdline file. Update the module to use the secure ``--password-from-stdin`` option instead, and add a warning in the module and in the documentation if svn version is too old to support it. (CVE-2020-1739)
- **security issue** win_unzip - normalize paths in archive to ensure extracted files do not escape from the target directory (CVE-2020-1737)
- **security_issue** - create temporary vault file with strict permissions when editing and prevent race condition (CVE-2020-1740)
+- Ensure we get an error when creating a remote tmp if it already exists. CVE-2020-1733
+- In fetch action, avoid using slurp return to set up dest, also ensure no dir traversal CVE-2020-1735.
+
+Bugfixes
+--------
+
- Ensure DataLoader temp files are removed at appropriate times and that we observe the LOCAL_TMP setting.
- Ensure we don't allow ansible_facts subkey of ansible_facts to override top level, also fix 'deprefixing' to prevent key transforms.
-- Ensure we get an error when creating a remote tmp if it already exists. CVE-2020-1733
- Fact Delegation - Add ability to indicate which facts must always be delegated. Primarily for ``discovered_interpreter_python`` right now, but extensible later. (https://github.com/ansible/ansible/issues/61002)
-- In fetch action, avoid using slurp return to set up dest, also ensure no dir traversal CVE-2020-1735.
- acl - fixed module failure if there are spaces in a path
v2.8.10
@@ -240,13 +277,17 @@ Minor Changes
- ansible-test defaults to redacting sensitive values (disable with the ``--no-redact`` option)
- dnf - Properly handle idempotent transactions with package name wildcard globs (https://github.com/ansible/ansible/issues/62809)
-Bugfixes
---------
+Security Fixes
+--------------
-- **SECURITY** - CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO
- **security issue** - Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856)
- **security issue** - properly hide parameters marked with ``no_log`` in suboptions when invalid parameters are passed to the module (CVE-2019-14858)
+
+Bugfixes
+--------
+
+- **SECURITY** - CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO
- ACI modules - Fix a whitespace issue in filters for ACI 4.2 strict validation
- ACME modules: fix bug in ACME v1 account update code
- ACME modules: support Buypass' ACME v1 endpoint
diff --git a/changelogs/fragments/v2.8.14_summary.yaml b/changelogs/fragments/v2.8.14_summary.yaml
new file mode 100644
index 0000000000..813227c0d9
--- /dev/null
+++ b/changelogs/fragments/v2.8.14_summary.yaml
@@ -0,0 +1,3 @@
+release_summary: |
+ | Release Date: 2020-08-10
+ | `Porting Guide <https://docs.ansible.com/ansible/devel/porting_guides.html>`__
diff --git a/lib/ansible/release.py b/lib/ansible/release.py
index c8e4f57180..c7c357bb73 100644
--- a/lib/ansible/release.py
+++ b/lib/ansible/release.py
@@ -19,6 +19,6 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
-__version__ = '2.8.13.post0'
+__version__ = '2.8.14'
__author__ = 'Ansible, Inc.'
__codename__ = 'How Many More Times'