This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An update for ansible and ceph-ansible is now available for Red Hat
Storage Console 2.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The ceph-ansible package provides Ansible playbooks for installing,
maintaining, and upgrading Red Hat Ceph Storage.
Ansible is a simple model-driven configuration management, multi-node
deployment, and remote task execution system. Ansible works over SSH
and does not require any software or daemons to be installed on remote
nodes. Extension modules can be written in any language and are
transferred to managed machines automatically.
The following packages have been upgraded to a later upstream version:
ceph-installer (1.2.2), ansible (18.104.22.168), python-passlib (1.6.5),
ceph-ansible (2.1.9). (BZ#1405630)
Security Fix(es) :
* An input validation vulnerability was found in Ansible's handling of
data sent from client systems. An attacker with control over a client
system being managed by Ansible and the ability to send facts back to
the Ansible server could use this flaw to execute arbitrary code on
the Ansible server using the Ansible server privileges.
Bug Fix(es) :
* Previously, the ceph-ansible utility permanently disabled the swap
partition. With this update, ceph-ansible can no longer disable swap.
* Previously, the ceph-ansible utility did not support adding
encrypted OSD nodes. As a consequence, an attempt to upgrade to a
newer, minor, or major version failed on encrypted OSD nodes. In
addition, Ansible returned the following error message during the disk
activation task :
mount: unknown filesystem type 'crypto_LUKS'
With this update, ceph-ansible supports adding encrypted OSD nodes,
and upgrading works as expected. (BZ#1366808)
* Due to a bug in the underlying source code, the ceph-ansible utility
in some cases failed on the copy roundep task. Consequently, the
installation process was unsuccessful. This bug has been fixed, and
the installation now proceeds as expected. (BZ#1382878)
* Previously, installation using the ceph-ansible utility failed on
the 'fix partitions gpt header or labels of the journal devices' task
in the ceph-osd role because of an empty variable. The underlying
source code has been modified, and the installation no longer fails in
this case. (BZ# 1400967)
* Previously, Red Hat Console Agent setup performed by the
ceph-ansible utility only supported installations by using the Content
Delivery Network (CDN). Installations with an ISO file or local Yum
repository failed. With this update, all installations are successful.
* Previously, the ceph-ansible utility was unable to purge a cluster
with encrypted OSD devices because the underlying ceph-disk utility
was unable to destroy the partition table on an encrypted device by
using the '--zap-disk' option. The underlying source code has been
fixed allowing ceph-disk to use the '--zap-disk' option on encrypted
devices. As a result, ceph-ansible can purge clusters with encrypted
OSD devices as expected. (BZ #1414647)
* Previously, during the creation of Ceph clusters with nodes that use
IPv6 addressing, ceph-ansible added the 'ms bind ipv6' key to the Ceph
configuration file, but it did not assign any value to it. This
behavior caused an error when parsing the configuration file after the
cluster creation. With this update, the 'ms bind ipv6' key is properly
set in the Ceph configuration file allowing for proper configuration
file parsing on clusters that use IPv6 addressing. (BZ#1419814)
* The ceph-ansible utility now supports the client role. This new role
enables you to install Ceph clients by using Ansible and deploy nodes
to run tests against the Ceph cluster. (BZ#1384622)
* The ceph-installer API now supports installation of OSD nodes that
have journals collocated on the same devices. (BZ#1412867)
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true