Recommended update for drbd and drbd-utils
| Announcement ID: | SUSE-RU-2018:0779-1 | 
|---|---|
| Rating: | moderate | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves one vulnerability and has nine fixes can now be installed.
Description:
This update for drbd and drbd-utils provides the following fixes:
Changes in drbd:
- Fix a possible kernel trace while starting the initial syncing of a stacked drbd. (bsc#1058770)
 - Fix auto promotion after split-brain. (bsc#1074228)
 - Support passing "--force" to drbdadm dump-md. (bsc#1077176)
 - Many upstream fixes in version 9.0.8 (bsc#1045473):
 - Fix a race condition between adding connections and receiving data.
 - Fix a OOPS on a diskfull node when a request from a diskless node.
 - Fix a distributed deadlock when doing a discard/write-same burst.
 - Fix an issue with diskless nodes adopting wrong current UUIDs.
 - Fix wrongly rejected two-phase-state transactions.
 - Fix initial resync, triggered by "--force primary".
 - Speed-up AL-updates with bio flags REQ_META and REQ_PRIO.
 - Merged changes from 8.4.10 and with that compatibility with Linux-4.12.
 - The kernel modules were rebuilt with retpoline support to mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)
 
Changes in drbd-utils:
- Fix the wrong device due to udev change. (bsc#1059566)
 - Support passing "--force" to drbdadm dump-md. (bsc#1077176)
 - Fix a possible kernel trace while starting the initial syncing of a stacked drbd. (bsc#1058770)
 - Backport some fixes of peer_device objects.
 - Do not hardcode loglevel local5 and make it possible to change that using --logfacility. (bsc#1064402)
 - Update documentation and examples regarding fencing: it is now moved from the dir to the net section. (bsc#1061145)
 - Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)
 - Disable quorum in default configuration. (bsc#1032142)
 - Fix auto promotion after split-brain. (bsc#1074228)
 - Use upstream's RA.
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise High Availability Extension 12 SP2
                
                    
                        
zypper in -t patch SUSE-SLE-HA-12-SP2-2018-530=1 - 
                SUSE Linux Enterprise Server for SAP Applications 12 SP2
                
                    
                        
zypper in -t patch SUSE-SLE-HA-12-SP2-2018-530=1 
Package List:
- 
                    SUSE Linux Enterprise High Availability Extension 12 SP2 (ppc64le s390x x86_64)
                    
- drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1
 - drbd-utils-9.0.0-8.15.1
 - drbd-9.0.8+git.c8bc3670-10.8.1
 - drbd-utils-debuginfo-9.0.0-8.15.1
 - drbd-debugsource-9.0.8+git.c8bc3670-10.8.1
 - drbd-kmp-default-debuginfo-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1
 - drbd-utils-debugsource-9.0.0-8.15.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
                    
- drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1
 - drbd-utils-9.0.0-8.15.1
 - drbd-9.0.8+git.c8bc3670-10.8.1
 - drbd-utils-debuginfo-9.0.0-8.15.1
 - drbd-debugsource-9.0.8+git.c8bc3670-10.8.1
 - drbd-kmp-default-debuginfo-9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1
 - drbd-utils-debugsource-9.0.0-8.15.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2017-5715.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1032142
 - https://bugzilla.suse.com/show_bug.cgi?id=1045473
 - https://bugzilla.suse.com/show_bug.cgi?id=1058770
 - https://bugzilla.suse.com/show_bug.cgi?id=1059566
 - https://bugzilla.suse.com/show_bug.cgi?id=1061145
 - https://bugzilla.suse.com/show_bug.cgi?id=1061147
 - https://bugzilla.suse.com/show_bug.cgi?id=1064402
 - https://bugzilla.suse.com/show_bug.cgi?id=1068032
 - https://bugzilla.suse.com/show_bug.cgi?id=1074228
 - https://bugzilla.suse.com/show_bug.cgi?id=1077176