Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: corosync

Found 2 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-35092
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package corosync-qdevice
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Corosync: corosync: denial of service via integer overflow in join message validation

A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.

Affected products

rhcos
corosync

Matching in nixpkgs

pkgs.corosync

Group Communication System with features for implementing high availability within applications

Ignored packages (1)

Package maintainers

No upstream fix (2026-04-02)

RH tracking issue: https://bugzilla.redhat.com/show_bug.cgi?id=2453169
Permalink CVE-2026-35091
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package corosync-qdevice
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Corosync: corosync: denial of service and information disclosure via crafted udp packet

A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.

Affected products

rhcos
corosync

Matching in nixpkgs

pkgs.corosync

Group Communication System with features for implementing high availability within applications

Ignored packages (1)

Package maintainers

No upstream fix (2026-04-02)

RH tracking issue: https://bugzilla.redhat.com/show_bug.cgi?id=2453169