logo
DATABASE RESOURCES PRICING ABOUT US

Important: corosync

Description

**Issue Overview:** Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function An integer overflow leading to an out-of-bound read was found in authenticate_nss_2_3() in Corosync. An attacker could craft a malicious packet that would lead to a denial of service.(CVE-2018-1084) **Affected Packages:** corosync **Issue Correction:** Run _yum update corosync_ to update your system. **New Packages:** src:     corosync-2.4.3-2.amzn2.1.src x86_64:     corosync-2.4.3-2.amzn2.1.x86_64     corosync-debuginfo-2.4.3-2.amzn2.1.x86_64     corosynclib-2.4.3-2.amzn2.1.x86_64     corosynclib-devel-2.4.3-2.amzn2.1.x86_64     corosync-qdevice-2.4.3-2.amzn2.1.x86_64     corosync-qnetd-2.4.3-2.amzn2.1.x86_64 ### Additional References Red Hat: [CVE-2018-1084](<https://access.redhat.com/security/cve/CVE-2018-1084>) Mitre: [CVE-2018-1084](<https://vulners.com/cve/CVE-2018-1084>)


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 2 corosync 2.4.3-2.amzn2.1
Amazon Linux 2 corosync 2.4.3-2.amzn2.1
Amazon Linux 2 corosync-debuginfo 2.4.3-2.amzn2.1
Amazon Linux 2 corosynclib 2.4.3-2.amzn2.1
Amazon Linux 2 corosynclib-devel 2.4.3-2.amzn2.1
Amazon Linux 2 corosync-qdevice 2.4.3-2.amzn2.1
Amazon Linux 2 corosync-qnetd 2.4.3-2.amzn2.1

Related