This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An update for ansible and gdeploy is now available for Red Hat Gluster
Storage 3.1 for RHEL 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Ansible is a simple model-driven configuration management, multi-node
deployment, and remote task execution system. Ansible works over SSH
and does not require any software or daemons to be installed on remote
nodes. Extension modules can be written in any language and are
transferred to managed machines automatically.
The gdeploy package provides Ansible modules to setup and configure
Security Fix(es) :
* An input validation vulnerability was found in Ansible's handling of
data sent from client systems. An attacker with control over a client
system being managed by Ansible and the ability to send facts back to
the Ansible server could use this flaw to execute arbitrary code on
the Ansible server using the Ansible-server privileges.
Bug Fix(es) :
* Previously, if SELinux Policy Management tool was not installed,
gdeploy did not display any error. Hence, the SELinux context was not
being set. With this update, gdeploy throws error if SELinux Policy
Management tool is not installed on the machine. (BZ#1340038)
* This update introduces the Slice Unit configuration feature for the
glusterfs services to organize a hierarchy for barriering the
processes within a specific memory, cpu limits. This feature ensures
that the Red Hat Gluster Storage's systemd unit(s) starts within the
specified Slice. To configure Slice, add the following parameter to
the configuration file: slice_setup=yes (BZ#1349790)
See also :
Update the affected ansible, gdeploy and / or python2-passlib
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true