NIXPKGS-2026-0942
GitHub issue
published on
Permalink
CVE-2026-35091
8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package corosync-qdevice
- @LeSuisse accepted
- @LeSuisse published on GitHub
Corosync: corosync: denial of service and information disclosure via crafted udp packet
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
References
Affected products
rhcos
corosync
Matching in nixpkgs
Ignored packages (1)
pkgs.corosync-qdevice
Corosync Cluster Engine Qdevice
Package maintainers
-
@ryantm Ryan Mulligan <ryan@ryantm.com>
-
@montag451 montag451 <montag451@laposte.net>