Bug 2453814 (CVE-2026-35092) - CVE-2026-35092 corosync: Corosync: Denial of Service via integer overflow in join message validation
Summary: CVE-2026-35092 corosync: Corosync: Denial of Service via integer overflow in ...
Keywords:
Status: NEW
Alias: CVE-2026-35092
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2453821
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-01 11:32 UTC by OSIDB Bzimport
Modified: 2026-04-06 07:27 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-01 11:32:27 UTC
Integer overflow (wraparound) vulnerability in Corosync’s join message sanity validation in exec/totemsrp.c. The flaw is in check_memb_join_sanity(), where proc_list_entries and failed_list_entries are attacker-controlled 32-bit unsigned values received from the network and are added together before being promoted to size_t. This allows the addition (proc_list_entries + failed_list_entries) to wrap around in 32-bit arithmetic (e.g., 0x80000000 + 0x80000000 = 0), causing required_len to be calculated too small and allowing a short packet to pass validation. As a result, Corosync proceeds with processing malformed input that should have been rejected, which can be exploited remotely without authentication in totemudp/totemudpu mode via crafted UDP packets to crash the service, resulting in a denial of service.


Note You need to log in before you can comment on or make changes to this bug.