{"id":"SUSE-RU-2018:0779-1","summary":"Recommended update for drbd and drbd-utils","details":"\nThis update for drbd and drbd-utils provides the following fixes:\n\nChanges in drbd:\n\n- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.\n  (bsc#1058770)\n- Fix auto promotion after split-brain. (bsc#1074228)\n- Support passing '--force' to drbdadm dump-md. (bsc#1077176)\n- Many upstream fixes in version 9.0.8 (bsc#1045473):\n  * Fix a race condition between adding connections and receiving data.\n  * Fix a OOPS on a diskfull node when a request from a diskless node.\n  * Fix a distributed deadlock when doing a discard/write-same burst.\n  * Fix an issue with diskless nodes adopting wrong current UUIDs.\n  * Fix wrongly rejected two-phase-state transactions.\n  * Fix initial resync, triggered by '--force primary'.\n  * Speed-up AL-updates with bio flags REQ_META and REQ_PRIO.\n  * Merged changes from 8.4.10 and with that compatibility with Linux-4.12.\n- The kernel modules were rebuilt with retpoline support to mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)\n\nChanges in drbd-utils:\n\n- Fix the wrong device due to udev change. (bsc#1059566)\n- Support passing '--force' to drbdadm dump-md. (bsc#1077176)\n- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.\n  (bsc#1058770)\n- Backport some fixes of peer_device objects.\n- Do not hardcode loglevel local5 and make it possible to change that using --logfacility.\n  (bsc#1064402)\n- Update documentation and examples regarding fencing: it is now moved from the dir to\n  the net section. (bsc#1061145)\n- Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)\n- Disable quorum in default configuration. (bsc#1032142)\n- Fix auto promotion after split-brain. (bsc#1074228)\n- Use upstream's RA.\n","modified":"2026-03-11T05:56:57.460894Z","published":"2018-03-22T13:45:01Z","related":["CVE-2017-5715"],"upstream":["CVE-2017-5715"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement//suse-ru-20180779-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1032142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1045473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1058770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1059566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1061145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1061147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1064402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1068032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1074228"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5715"}],"affected":[{"package":{"name":"drbd","ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP2","purl":"pkg:rpm/suse/drbd&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.8+git.c8bc3670-10.8.1"}]}],"ecosystem_specific":{"binaries":[{"drbd":"9.0.8+git.c8bc3670-10.8.1","drbd-kmp-default":"9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1","drbd-utils":"9.0.0-8.15.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-RU-2018:0779-1.json"}},{"package":{"name":"drbd-utils","ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP2","purl":"pkg:rpm/suse/drbd-utils&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.0-8.15.1"}]}],"ecosystem_specific":{"binaries":[{"drbd":"9.0.8+git.c8bc3670-10.8.1","drbd-kmp-default":"9.0.8+git.c8bc3670_k4.4.114_92.67-10.8.1","drbd-utils":"9.0.0-8.15.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-RU-2018:0779-1.json"}}],"schema_version":"1.7.5"}