Security update for pacemaker

SUSE Security Update: Security update for pacemaker
Announcement ID: SUSE-SU-2019:2268-1
Rating: important
References: #1032511 #1127716 #1130122 #1131353 #1131356 #1133866 #1135317 #1136712 #1140519
Cross-References: CVE-2018-16877 CVE-2018-16878
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12-SP4
  • SUSE Linux Enterprise High Availability 12-SP4

An update that solves two vulnerabilities and has 7 fixes is now available.


This update for pacemaker fixes the following issues:
Security issues fixed:

  • CVE-2018-16877: Fixed insufficient local IPC client-server authentication on the client's side. (bsc#1131356)
  • CVE-2018-16878: Fixed insufficient verification inflicted preference of uncontrolled processes (bsc#1131353)

Other issues fixed:
  • stonith_admin --help: specify the usage of --cleanup (bsc#1135317)
  • scheduler: wait for probe actions to complete to prevent unnecessary restart/re-promote of dependent resources (bsc#1130122, bsc#1032511)
  • controller: confirm cancel of failed monitors (bsc#1133866)
  • controller: improve failed recurring action messages (bsc#1133866)
  • controller: directly acknowledge unrecordable operation results (bsc#1133866)
  • controller: be more tolerant of malformed executor events (bsc#1133866)
  • libcrmcommon: return error when applying XML diffs containing unknown operations (bsc#1127716)
  • libcrmcommon: avoid possible use-of-NULL when applying XML diffs (bsc#1127716)
  • libcrmcommon: correctly apply XML diffs with multiple move/create changes (bsc#1127716)
  • libcrmcommon: return proper code if testing pid is denied (bsc#1131353, bsc#1131356)
  • libcrmcommon: avoid use-of-NULL when checking whether process is active (bsc#1131353, bsc#1131356)
  • tools: run main loop for crm_resource clean-up with resource (bsc#1140519)
  • contoller,scheduler: guard hash table deletes (bsc#1136712)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Development Kit 12-SP4:
    zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-2268=1
  • SUSE Linux Enterprise High Availability 12-SP4:
    zypper in -t patch SUSE-SLE-HA-12-SP4-2019-2268=1

Package List:

  • SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
    • libpacemaker-devel-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cts-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cts-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-debugsource-1.1.19+20181105.ccd6b5b10-3.13.1
  • SUSE Linux Enterprise High Availability 12-SP4 (ppc64le s390x x86_64):
    • libpacemaker3-1.1.19+20181105.ccd6b5b10-3.13.1
    • libpacemaker3-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cli-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cli-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cts-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-cts-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-debugsource-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-remote-1.1.19+20181105.ccd6b5b10-3.13.1
    • pacemaker-remote-debuginfo-1.1.19+20181105.ccd6b5b10-3.13.1