Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0943

NIXPKGS-2026-0943
published on
Permalink CVE-2026-35092
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 8 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package corosync-qdevice
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Corosync: corosync: denial of service via integer overflow in join message validation

A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.

Affected products

rhcos
corosync

Matching in nixpkgs

pkgs.corosync

Group Communication System with features for implementing high availability within applications

Ignored packages (1)

Package maintainers

No upstream fix (2026-04-02)

RH tracking issue: https://bugzilla.redhat.com/show_bug.cgi?id=2453169