Description
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
INFO
Published Date :
2026-04-01T13:18:55.551Z
Last Modified :
2026-05-06T20:40:46.447Z
Source :
redhat
AFFECTED PRODUCTS
The following products are affected by CVE-2026-35092 vulnerability.
| Vendors | Products |
|---|---|
| Corosync |
|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35092.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact