[Debian-ha-maintainers] Bug#1133837: corosync: CVE-2026-35092

Salvatore Bonaccorso carnil at debian.org
Tue Apr 14 19:37:45 BST 2026


Source: corosync
Version: CVE-2026-35092
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for corosync.

CVE-2026-35092[0]:
| A flaw was found in Corosync. An integer overflow vulnerability in
| Corosync's join message sanity validation allows a remote,
| unauthenticated attacker to send crafted User Datagram Protocol
| (UDP) packets. This can cause the service to crash, leading to a
| denial of service. This vulnerability specifically affects Corosync
| deployments configured to use totemudp/totemudpu mode.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-35092
    https://www.cve.org/CVERecord?id=CVE-2026-35092
[1] https://github.com/corosync/corosync/commit/4082294f5094a7591e4e00658c5a605f05d644f1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Debian-ha-maintainers mailing list