UbuntuUpdates.org

Package "libpe-rules2"

Name: libpe-rules2

Description:

cluster resource manager Policy Engine rules library

Latest version: 1.1.14-2ubuntu1.9
Release: xenial (16.04)
Level: updates
Repository: main
Head package: pacemaker
Homepage: http://www.clusterlabs.org/

Links


Download "libpe-rules2"


Other versions of "libpe-rules2" in Xenial

Repository Area Version
base main 1.1.14-2ubuntu1
security main 1.1.14-2ubuntu1.9

Changelog

Version: 1.1.14-2ubuntu1.9 2020-11-09 15:07:08 UTC

  pacemaker (1.1.14-2ubuntu1.9) xenial-security; urgency=medium

  * SECURITY UPDATE: ACL restrictions bypass
    - debian/patches/CVE-2020-25654-*.patch: restrict IPC connections.
    - CVE-2020-25654

 -- Marc Deslauriers <email address hidden> Thu, 29 Oct 2020 09:06:38 -0400

Source diff to previous version
CVE-2020-25654 ACL restrictions bypass

Version: 1.1.14-2ubuntu1.8 2020-05-20 00:06:33 UTC

  pacemaker (1.1.14-2ubuntu1.8) xenial; urgency=medium

  * d/p/lp1877280/0001-Fix-attrd-crash-on-exit-if-initialization-fails.patch,
    d/p/lp1877280/0002-Fix-attrd-ipc-Prevent-possible-segfault-on-exit.patch:
    - avoid segfault on exit (LP: #1877280)

 -- Dan Streetman <email address hidden> Thu, 07 May 2020 06:34:35 -0400

Source diff to previous version
1877280 attrd can segfault on exit

Version: 1.1.14-2ubuntu1.7 2020-05-11 17:07:26 UTC

  pacemaker (1.1.14-2ubuntu1.7) xenial; urgency=medium

  [ Victor Tapia ]
  * d/p/lp1871166/0001-Fix-libservices-prevent-use-after-free-when-freeing-.patch,
    d/p/lp1871166/0002-Fix-libservices-ensure-completed-ops-aren-t-on-block.patch,
    d/p/lp1871166/0003-Refactor-libservices-handle-in-flight-case-first-whe.patch,
    d/p/lp1871166/0004-Fix-libservices-properly-cancel-in-flight-systemd-up.patch,
    d/p/lp1871166/0005-Fix-libservices-properly-detect-in-flight-systemd-up.patch:
    - prevent use-after-free segfault (LP: #1871166)

 -- Dan Streetman <email address hidden> Mon, 06 Apr 2020 13:37:40 -0400

Source diff to previous version
1871166 lrmd crashes

Version: 1.1.14-2ubuntu1.6 2019-04-23 14:06:29 UTC

  pacemaker (1.1.14-2ubuntu1.6) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS and local privilege escalation in client-server
    authentication
    - debian/patches/CVE-2018-1687x-1.patch: make crm_pid_active more
      precise as to when detections fail in include/crm_internal.h,
      lib/common/utils.c.
    - debian/patches/CVE-2018-1687x-2.patch: add new helpers to allow IPC
      client side to authenticate the server in configure.ac,
      include/crm/common/Makefile.am, include/crm/common/ipc.h,
      include/crm/common/ipc_internal.h, lib/common/ipc.c.
    - debian/patches/CVE-2018-1687x-3.patch: pacemakerd to trust
      pre-existing processes via new checks instead in mcp/pacemaker.c.
    - debian/patches/CVE-2018-1687x-4.patch: other daemons to authenticate
      IPC servers of fellow processes in lib/cluster/corosync.c,
      lib/cluster/cpg.c, lib/common/ipc.c, mcp/corosync.c.
    - debian/patches/CVE-2018-1687x-5.patch: CPG users to be careful about
      now-more-probable rival processes in attrd/main.c, cib/main.c,
      crmd/main.c, fencing/main.c, lib/cluster/cpg.c.
    - debian/patches/CVE-2018-1687x-6.patch: fix possible NULL pointer
      dereference in crmd/control.c.
    - debian/libcrmcommon3.symbols: added new symbols.
    - CVE-2018-16877
    - CVE-2018-16878

 -- Marc Deslauriers <email address hidden> Thu, 18 Apr 2019 08:30:39 -0400

Source diff to previous version
CVE-2018-1687 RESERVED
CVE-2018-16877 A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could us
CVE-2018-16878 A flaw was found in pacemaker up to and including version 2.0.1. An insufficient verification inflicted preference of uncontrolled processes can lead

Version: 1.1.14-2ubuntu1.5 2019-03-21 13:07:00 UTC

  pacemaker (1.1.14-2ubuntu1.5) xenial; urgency=medium

  * Change systemd unit to source /etc/default files by default
    (LP: #1819046)

 -- <email address hidden> (Heitor R. Alves de Siqueira) Thu, 07 Mar 2019 15:13:34 -0300

1819046 Systemd unit file reads settings from wrong path



About   -   Send Feedback to @ubuntu_updates