A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-35092 | Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453169 | Exploit Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453814 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Apr 2026, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:redhat:openshift:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:corosync:corosync:-:*:*:*:*:*:*:* |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-35092 - Third Party Advisory, VDB Entry | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453169 - Exploit, Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453814 - Issue Tracking, Third Party Advisory | |
| First Time |
Redhat
Redhat enterprise Linux Redhat openshift Corosync Corosync corosync |
01 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 14:16
Updated : 2026-04-07 16:35
NVD link : CVE-2026-35092
Mitre link : CVE-2026-35092
CVE.ORG link : CVE-2026-35092
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift
corosync
- corosync
CWE
CWE-190
Integer Overflow or Wraparound
