logo
DATABASE RESOURCES PRICING ABOUT US

Security update for corosync (important)

Description

This update for corosync provides the following fixes: - CVE-2018-1084: Integer overflow in totemcrypto:authenticate_nss_2_3() could lead to command execution (bsc#1089346) - Providing an empty uid or gid results in coroparse adding uid 0. (bsc#1066585) - Fix a problem that was causing corosync memory to increase on ring breakup. (bsc#1083030) - Fix a problem with configuration file incompatibilities that was causing corosync to not work after upgrading from SLE-11-SP4-HA to SLE-12/15-HA. (bsc#1083561)


Affected Package


OS OS Version Package Name Package Version
SUSE Linux Enterprise High Availability 12.2 corosync-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync-debugsource 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 libcorosync4-debuginfo 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync-debugsource 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync 2.3.5-6.23.1
SUSE Linux Enterprise High Availability 12.2 corosync-debugsource 2.3.5-6.23.1

Related