what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2017-0515-01

Red Hat Security Advisory 2017-0515-01
Posted Mar 14, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0515-01 - The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage. Ansible is a simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. The following packages have been upgraded to a later upstream version: ceph-installer, ansible, python-passlib, ceph-ansible.

tags | advisory, remote, python
systems | linux, redhat
advisories | CVE-2016-9587
SHA-256 | 78f243ebadb2587f53a012c34b7ae7de20e0eef82952e18f4fa40930d5aede23

Red Hat Security Advisory 2017-0515-01

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: ansible and ceph-ansible security, bug fix, and enhancement update
Advisory ID: RHSA-2017:0515-01
Product: Red Hat Storage Console
Advisory URL: https://access.redhat.com/errata/RHSA-2017:0515
Issue date: 2017-03-14
CVE Names: CVE-2016-9587
=====================================================================

1. Summary:

An update for ansible and ceph-ansible is now available for Red Hat Storage
Console 2.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Storage Console Installer 2 - noarch

3. Description:

The ceph-ansible package provides Ansible playbooks for installing,
maintaining, and upgrading Red Hat Ceph Storage.

Ansible is a simple model-driven configuration management, multi-node
deployment, and remote task execution system. Ansible works over SSH and
does not require any software or daemons to be installed on remote nodes.
Extension modules can be written in any language and are transferred to
managed machines automatically.

The following packages have been upgraded to a later upstream version:
ceph-installer (1.2.2), ansible (2.2.1.0), python-passlib (1.6.5),
ceph-ansible (2.1.9). (BZ#1405630)

Security Fix(es):

* An input validation vulnerability was found in Ansible's handling of data
sent from client systems. An attacker with control over a client system
being managed by Ansible and the ability to send facts back to the Ansible
server could use this flaw to execute arbitrary code on the Ansible server
using the Ansible server privileges. (CVE-2016-9587)

Bug Fix(es):

* Previously, the ceph-ansible utility permanently disabled the swap
partition. With this update, ceph-ansible can no longer disable swap.
(BZ#1364167)

* Previously, the ceph-ansible utility did not support adding encrypted OSD
nodes. As a consequence, an attempt to upgrade to a newer, minor, or major
version failed on encrypted OSD nodes. In addition, Ansible returned the
following error message during the disk activation task:

mount: unknown filesystem type 'crypto_LUKS'

With this update, ceph-ansible supports adding encrypted OSD nodes, and
upgrading works as expected. (BZ#1366808)

* Due to a bug in the underlying source code, the ceph-ansible utility in
some cases failed on the copy roundep task. Consequently, the installation
process was unsuccessful. This bug has been fixed, and the installation now
proceeds as expected. (BZ#1382878)

* Previously, installation using the ceph-ansible utility failed on the
"fix partitions gpt header or labels of the journal devices" task in the
ceph-osd role because of an empty variable. The underlying source code has
been modified, and the installation no longer fails in this case.
(BZ#1400967)

* Previously, Red Hat Console Agent setup performed by the ceph-ansible
utility only supported installations by using the Content Delivery Network
(CDN). Installations with an ISO file or local Yum repository failed. With
this update, all installations are successful. (BZ#1403576)

* Previously, the ceph-ansible utility was unable to purge a cluster with
encrypted OSD devices because the underlying ceph-disk utility was unable
to destroy the partition table on an encrypted device by using the
"--zap-disk" option. The underlying source code has been fixed allowing
ceph-disk to use the "--zap-disk" option on encrypted devices. As a result,
ceph-ansible can purge clusters with encrypted OSD devices as expected.
(BZ#1414647)

* Previously, during the creation of Ceph clusters with nodes that use IPv6
addressing, ceph-ansible added the "ms bind ipv6" key to the Ceph
configuration file, but it did not assign any value to it. This behavior
caused an error when parsing the configuration file after the cluster
creation. With this update, the "ms bind ipv6" key is properly set in the
Ceph configuration file allowing for proper configuration file parsing on
clusters that use IPv6 addressing. (BZ#1419814)

Enhancement(s):

* The ceph-ansible utility now supports the client role. This new role
enables you to install Ceph clients by using Ansible and deploy nodes to
run tests against the Ceph cluster. (BZ#1384622)

* The ceph-installer API now supports installation of OSD nodes that have
journals collocated on the same devices. (BZ#1412867)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1312443 - restrict access to endpoints to localhost only
1339576 - [ceph-ansible] purge-cluster fails with "grep: write error"
1364167 - [ceph-ansible] role ceph-common disables swap by default
1366808 - Ansible: upgrade nodes with encrypted OSDs and support for dm-crypt
1382878 - [ansible 1.0.8-1] fails during copy rundep - with_items expects a list or a set
1384622 - Add the client role to ceph-ansible
1400967 - [ceph-ansible] ceph-ansible failing to check raw journal devices
1403576 - Agent installation fails in ceph nodes upgraded from 1.3 to 2.0 and connected to local yum repository
1404378 - CVE-2016-9587 Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
1404515 - ceph-ansible should set set apt pinning for deb packages
1405630 - resync with ceph-ansible upstream v2.1 release
1405985 - [ceph-ansible]: enable CDN repository to allow installation of ceph-mds
1406556 - Upgrade of Ansible packages (2.2.1.0)
1412867 - Allow OSDs to be configured/installed with journal colocation
1413985 - [ceph-ansible]: purge-cluster.yml fails with ""Partition number 2 out of range!" on RHEL
1414647 - [ceph-ansible]: purge cluster fails to zap OSD disks having encrypted OSDs
1416010 - [ceph-ansible] config file generation fails on ipv6 nodes with message dict object' has no attribute 'address'
1418980 - [ceph-ansible]: purge cluster on ubuntu fails to purge client node.
1419814 - [ceph-ansible] no value is set to the key 'ms bind ipv6' in config file during ipv6 cluster creation
1422134 - RHSCON-2: purge-cluster does not remove calamari-server packages

6. Package List:

Red Hat Storage Console Installer 2:

Source:
ansible-2.2.1.0-1.el7.src.rpm
ceph-ansible-2.1.9-1.el7scon.src.rpm
ceph-installer-1.2.2-1.el7scon.src.rpm
python-passlib-1.6.5-1.1.el7.src.rpm

noarch:
ansible-2.2.1.0-1.el7.noarch.rpm
ceph-ansible-2.1.9-1.el7scon.noarch.rpm
ceph-installer-1.2.2-1.el7scon.noarch.rpm
python-passlib-1.6.5-1.1.el7.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-9587
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en/red-hat-storage-console/2.0/paged/release-notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYyBjUXlSAg2UNWIIRAsQZAKCOs+HTOPTX6sJvBnqL/PljRbnxmACeKSld
nZ+MauMXrHEPn9Yg0ddIfkc=
=FnNa
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close