Описание
Recommended update for drbd, drbd-utils
This update for drbd and drbd-utils provides the following fixes:
Changes in drbd-utils:
- Make sure the full bitmap gets properly propagated in drbdmeta. Also make sure the ID is kept when downgrading from v9 to v8. (bsc#1037109)
- Support passing '--force' to drbdadm dump-md. (bsc#1077176)
- Fix a possible kernel trace while starting the initial syncing of a stacked drbd. (bsc#1058770)
- Backport some fixes of peer_device objects.
- Do not hardcode loglevel local5 and make it possible to change that using --logfacility. (bsc#1064402)
- Update documentation and examples regarding fencing: it is now moved from the disk to the net section. (bsc#1061145)
- Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)
- The included kernel modules in the KMP packages were rebuilt using 'retpoline' support to mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)
Changes in drbd:
- Make sure the full bitmap gets properly propagated in drbdmeta. (bsc#1037109)
Список пакетов
SUSE Linux Enterprise High Availability Extension 12 SP3
drbd-9.0.8+git.c8bc3670-3.3.2
drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2
drbd-utils-9.0.0-2.8.1
Ссылки
- Link for SUSE-RU-2018:0821-1
- E-Mail link for SUSE-RU-2018:0821-1
- SUSE Security Ratings
- SUSE Bug 1037109
- SUSE Bug 1058770
- SUSE Bug 1061145
- SUSE Bug 1061147
- SUSE Bug 1064402
- SUSE Bug 1068032
- SUSE Bug 1077176
- SUSE CVE CVE-2017-5715 page
Описание
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Затронутые продукты
SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.3.2
SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_94.14-3.3.2
SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-utils-9.0.0-2.8.1
Ссылки
- CVE-2017-5715
- SUSE Bug 1068032
- SUSE Bug 1074562
- SUSE Bug 1074578
- SUSE Bug 1074701
- SUSE Bug 1074741
- SUSE Bug 1074919
- SUSE Bug 1075006
- SUSE Bug 1075007
- SUSE Bug 1075262
- SUSE Bug 1075419
- SUSE Bug 1076115
- SUSE Bug 1076372
- SUSE Bug 1076606
- SUSE Bug 1078353
- SUSE Bug 1080039
- SUSE Bug 1087887
- SUSE Bug 1087939
- SUSE Bug 1088147
- SUSE Bug 1089055