--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-67e684044e
2019-04-30 01:29:14.184468
--------------------------------------------------------------------------------
Name : libqb
Product : Fedora 30
Version : 1.0.5
Release : 1.fc30
URL :
https://github.com/ClusterLabs/libqb
Summary : An IPC library for high performance servers
Description :
libqb provides high-performance, reusable features for client-server
architecture, such as logging, tracing, inter-process communication (IPC),
and polling.
--------------------------------------------------------------------------------
Update Information:
Security fix for "Insecure treatment of IPC (temporary) files" (CVE pending)
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 26 2019 Jan Pokorn�� <jpokorny+rpm-libqb(a)redhat.com> - 1.0.5-1
- Update to libqb-1.0.5, for list of changes see:
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5
(note that 1.0.4 is botched from pacemaker/corosync cluster stack
perspective so that is intentionally skipped)
- Includes an important fix for a security issue (CVE-2019-XXXX/TBD,
https://github.com/ClusterLabs/libqb/issues/338)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1695948 - libqb: Insecure treatment of IPC (temporary) files
https://bugzilla.redhat.com/show_bug.cgi?id=1695948
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-67e684044e' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------