PT-2026-29517 · Corosync · Corosync
Sebasteuo / 0Xs4Bb1
+1
·
Published
2026-04-01
·
Updated
2026-04-01
·
CVE-2026-35092
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Corosync (affected versions not specified)
Description
A flaw exists in Corosync where an integer overflow in the join message sanity validation can be triggered by sending crafted User Datagram Protocol (UDP) packets. This allows a remote, unauthenticated attacker to cause a denial of service by crashing the service. This vulnerability specifically impacts Corosync deployments using totemudp/totemudpu mode.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Integer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Corosync