CVE-2026-35092
EUVD-2026-1788101.04.2026, 14:16
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| corosync | corosync | - |
| redhat | openshift | 4.0 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux | 10.0 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Red Hat Enterprise Linux Releases
Red Hat Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| corosync |
| ||||||||||||||
| corosync-vqsim |
| ||||||||||||||
| corosynclib |
| ||||||||||||||
| corosynclib-devel |
| ||||||||||||||
| spausedd |
|
References