openSUSE Security Update : pacemaker (openSUSE-2016-1447)

high Nessus Plugin ID 95753

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for pacemaker fixes the following issues :

- remote: Allow cluster and remote LRM API versions to diverge (bsc#1009076)

- libcrmcommon: fix CVE-2016-7035 (improper IPC guarding) (bsc#1007433)

- sysconfig: minor tweaks (typo, wording)

- spec: more robust check for systemd being in use

- spec: defines instead of some globals + error suppression

- various: issues discovered via valgrind and coverity

- attrd_updater: fix usage of HAVE_ATOMIC_ATTRD

- crmd: cl#5185 - Record pending operations in the CIB before they are performed (bsc#1003565)

- ClusterMon: fix to avoid matching other process with the same PID

- mcp: improve comments for sysconfig options

- remove openssl-devel and libselinux-devel as build dependencies

- tools: crm_standby --version/--help should work without cluster

- libpengine: only log startup-fencing warning once

- pacemaker.service: do not mistakenly suggest killing fenced

- libcrmcommon: report errors consistently when waiting for data on connection (bsc#986644)

- remote: Correctly calculate the remaining timeouts when receiving messages (bsc#986644)

- libfencing: report added node ID correctly

- crm_mon: Do not call setenv with null value

- pengine: Do not fence a maintenance node if it shuts down cleanly (bsc#1000743)

- ping: Avoid temporary files for fping check (bsc#987348)

- all: clarify licensing and copyrights

- crmd: Resend the shutdown request if the DC forgets

- ping: Avoid temp files in fping_check (bsc#987348)

- crmd: Ensure the R_SHUTDOWN is set whenever we ask the DC to shut us down

- crmd: clear remote node operation history only when it comes up

- libcib,libfencing,libtransition: handle memory allocation errors without CRM_CHECK()

- tools: make crm_mon XML schema handle resources with multiple active

- pengine: set OCF_RESKEY_CRM_meta_notify_active_* for multistate resources

- pengine: avoid null dereference in new same-node ordering option

- lrmd,libcluster: ensure g_hash_table_foreach() is never passed a null table

- crmd: don't log warning if abort_unless_down() can't find down event

- lib: Correction of the deletion of the notice registration.

- stonithd: Correction of the wrong connection process name.

- crmd: Keep a state of LRMD in the DC node latest.

- pengine: avoid transition loop for start-then-stop + unfencing

- libpengine: allow pe_order_same_node option for constraints

- cts: Restart systemd-journald with 'systemctl restart systemd-journald.socket' (bsc#995365)

- libcrmcommon: properly handle XML comments when comparing v2 patchset diffs

- crmd: don't abort transitions for CIB comment changes

- libcrmcommon: log XML comments correctly

- libcrmcommon: remove extraneous format specifier from log message

- remote: cl#5269 - Notify other clients of a new connection only if the handshake has completed (bsc#967388, bsc#1002767, CVE-2016-7797)

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Solution

Update the affected pacemaker packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1000743

https://bugzilla.opensuse.org/show_bug.cgi?id=1002767

https://bugzilla.opensuse.org/show_bug.cgi?id=1003565

https://bugzilla.opensuse.org/show_bug.cgi?id=1007433

https://bugzilla.opensuse.org/show_bug.cgi?id=1009076

https://bugzilla.opensuse.org/show_bug.cgi?id=967388

https://bugzilla.opensuse.org/show_bug.cgi?id=986644

https://bugzilla.opensuse.org/show_bug.cgi?id=987348

https://bugzilla.opensuse.org/show_bug.cgi?id=995365

Plugin Details

Severity: High

ID: 95753

File Name: openSUSE-2016-1447.nasl

Version: 3.6

Type: local

Agent: unix

Published: 12/13/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libpacemaker-devel, p-cpe:/a:novell:opensuse:libpacemaker3, p-cpe:/a:novell:opensuse:libpacemaker3-debuginfo, p-cpe:/a:novell:opensuse:pacemaker, p-cpe:/a:novell:opensuse:pacemaker-cli, p-cpe:/a:novell:opensuse:pacemaker-cli-debuginfo, p-cpe:/a:novell:opensuse:pacemaker-cts, p-cpe:/a:novell:opensuse:pacemaker-cts-debuginfo, p-cpe:/a:novell:opensuse:pacemaker-debuginfo, p-cpe:/a:novell:opensuse:pacemaker-debugsource, p-cpe:/a:novell:opensuse:pacemaker-remote, p-cpe:/a:novell:opensuse:pacemaker-remote-debuginfo, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 12/12/2016

Reference Information

CVE: CVE-2016-7035, CVE-2016-7797