This page is to provide an overview of past security sensitive findings in some software packages under ClusterLabs umbrella. Currently, only pacemaker is tracked here. The page also provides guidance on various related points.
Note that currently there is no standardized process of reporting the new findings to us in the responsible manner. Contacting the particular vendor privately (via encrypted e-mail if possible) seems currently best what you can do. This recommendation can be revisited in the future, so please always consult this page for up-to-date instructions first (we will never ask you to contact us on suspicious-looking e-mail addresses, just in case this page gets unauthorized modifications).
2019-04-17: this has been further
refined that posting to a dedicated
list is currently the most optimal way of a general disclosure (seconded
with contacting particular vendors, all preferably in an encrypted
Other notable commits and notes
These fix weaknesses that can be harmful only in combination with "bad surrounding" or under "bad conditions". This is mostly for developers' own reference of what to be careful about.
- pacemaker: fixes to infinite blocking/loops
These are some tangential notes: