[Debian-ha-maintainers] Bug#1133837: corosync: CVE-2026-35092
Salvatore Bonaccorso
carnil at debian.org
Tue Apr 14 19:37:45 BST 2026
Source: corosync
Version: CVE-2026-35092
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerability was published for corosync.
CVE-2026-35092[0]:
| A flaw was found in Corosync. An integer overflow vulnerability in
| Corosync's join message sanity validation allows a remote,
| unauthenticated attacker to send crafted User Datagram Protocol
| (UDP) packets. This can cause the service to crash, leading to a
| denial of service. This vulnerability specifically affects Corosync
| deployments configured to use totemudp/totemudpu mode.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-35092
https://www.cve.org/CVERecord?id=CVE-2026-35092
[1] https://github.com/corosync/corosync/commit/4082294f5094a7591e4e00658c5a605f05d644f1
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Debian-ha-maintainers
mailing list