|
|
Log in / Subscribe / Register

Ubuntu alert USN-4000-1 (corosync)

From:  "Leonidas S. Barbosa" <leo.barbosa@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4000-1] Corosync vulnerability
Date:  Thu, 30 May 2019 14:25:41 -0300
Message-ID:  <1559237141.3156.14.camel@canonical.com>

========================================================================== Ubuntu Security Notice USN-4000-1 May 30, 2019 corosync vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Corosync could be made to crash or execute arbitrary code if it received a specially crafted request. Software Description: - corosync: cluster engine daemon and utilities Details: It was discovered that Corosync incorrectly handled certain requests. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS:   corosync                        2.4.3-0ubuntu1.1   libtotem-pg5                    2.4.3-0ubuntu1.1 Ubuntu 16.04 LTS:   corosync                        2.3.5-3ubuntu2.3   libtotem-pg5                    2.3.5-3ubuntu2.3 After a standard system update you need to restart Corosync to make all the necessary changes. References:   https://usn.ubuntu.com/usn/usn-4000-1   CVE-2018-1084 Package Information:   https://launchpad.net/ubuntu/+source/corosync/2.4.3-0ubun...   https://launchpad.net/ubuntu/+source/corosync/2.3.5-3ubun...-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds