7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package corosync-qdevice
- @LeSuisse accepted
- @LeSuisse published on GitHub
Corosync: corosync: denial of service via integer overflow in join message validation
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
References
Affected products
Matching in nixpkgs
Ignored packages (1)
pkgs.corosync-qdevice
Corosync Cluster Engine Qdevice
Package maintainers
-
@ryantm Ryan Mulligan <ryan@ryantm.com>
-
@montag451 montag451 <montag451@laposte.net>