Package "multipath-tools"

Name: multipath-tools


maintain multipath block device access

Latest version: 0.8.3-1ubuntu2.3
Release: focal (20.04)
Level: updates
Repository: main
Homepage: http://christophe.varoqui.free.fr/


Download "multipath-tools"

Other versions of "multipath-tools" in Focal

Repository Area Version
base main 0.8.3-1ubuntu2
security main 0.8.3-1ubuntu2.1

Packages in group

Deleted packages are displayed in grey.


Version: 0.8.3-1ubuntu2.3 2023-12-07 21:06:58 UTC

  multipath-tools (0.8.3-1ubuntu2.3) focal; urgency=medium

  [ Jorge Merlino ]
  * Multipath devices not removed with high load (LP: #2039719)
    - d/p/lp2039719-1-libmultipath-make-dm_get_map-status-return-codes-sym.patch:
      change the return value of some functions from a boolean to symbolic codes
      to differentiate errors
    - d/p/lp2039719-2-multipathd-fix-check_path-errors-with-removed-map.patch:
      use the new error codes to change the error processing on the
      check_path() procedure

  [ Mauricio Faria de Oliveira ]
  * Add upstream fixes:
    - d/p/lp2039719-3-multipathd-fix-NULL-dereference-in-check_path.patch
    - d/p/lp2042366-dm_get_map-fix-segfault-when-can-t-found-target.patch
      (LP: #2042366)

 -- Jorge Merlino <email address hidden> Tue, 07 Nov 2023 18:20:27 -0300

Source diff to previous version
2039719 Multipath devices not removed with high load
2042366 Fix segfault in dm_get_map() on null device-mapper parameters

Version: 0.8.3-1ubuntu2.2 2023-11-07 17:07:25 UTC

  multipath-tools (0.8.3-1ubuntu2.2) focal; urgency=medium

  * Do not install init scripts (LP: #2000186)
    - d/multipath-tools.maintscript: remove /etc/init.d/multipath-tools
    - d/rules: do not call dh_installinit

 -- Mitchell Dzurick <email address hidden> Mon, 24 Jul 2023 16:06:36 -0700

Source diff to previous version
2000186 update fails on cloud server (invoke-rc.d restart failed) when using an unsupported kernel

Version: 0.8.3-1ubuntu2.1 2022-11-17 16:06:23 UTC

  multipath-tools (0.8.3-1ubuntu2.1) focal-security; urgency=medium

  * SECURITY UPDATE: symlink attack
    - debian/patches/CVE-2022-41973.patch: use /run instead of /dev/shm in
      .gitignore, Makefile.inc, libmultipath/defaults.h,
      multipath/Makefile, multipath/multipath.rules.in,
    - debian/multipath-tools.install, debian/multipath-udeb.install:
      install tmpfiles.d/multipath.conf.
    - debian/rules: copy udev rule after build.
    - CVE-2022-41973
  * SECURITY UPDATE: authorization bypass
    - debian/patches/CVE-2022-41974.patch: ignore duplicated multipathd
      command keys in multipathd/main.c, multipathd/cli.c.
    - CVE-2022-41974

 -- Marc Deslauriers <email address hidden> Mon, 31 Oct 2022 11:14:23 -0400

CVE-2022-41973 multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local use
CVE-2022-41974 multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973.

About   -   Send Feedback to @ubuntu_updates