Bug 2453814 (CVE-2026-35092) - CVE-2026-35092 corosync: Corosync: Denial of Service via integer overflow in join message validation
Summary: CVE-2026-35092 corosync: Corosync: Denial of Service via integer overflow in ...
Keywords:
Status: NEW
Alias: CVE-2026-35092
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2453821
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-01 11:32 UTC by OSIDB Bzimport
Modified: 2026-05-19 18:00 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:13644 0 None None None 2026-05-05 09:18:47 UTC
Red Hat Product Errata RHSA-2026:13657 0 None None None 2026-05-05 10:04:52 UTC
Red Hat Product Errata RHSA-2026:13673 0 None None None 2026-05-05 10:23:47 UTC
Red Hat Product Errata RHSA-2026:14205 0 None None None 2026-05-06 15:47:19 UTC
Red Hat Product Errata RHSA-2026:14210 0 None None None 2026-05-06 16:15:28 UTC
Red Hat Product Errata RHSA-2026:14211 0 None None None 2026-05-06 16:10:47 UTC
Red Hat Product Errata RHSA-2026:14212 0 None None None 2026-05-06 16:27:52 UTC
Red Hat Product Errata RHSA-2026:14213 0 None None None 2026-05-06 16:30:23 UTC
Red Hat Product Errata RHSA-2026:14214 0 None None None 2026-05-06 16:20:06 UTC
Red Hat Product Errata RHSA-2026:14215 0 None None None 2026-05-06 16:15:05 UTC
Red Hat Product Errata RHSA-2026:14216 0 None None None 2026-05-06 16:25:59 UTC
Red Hat Product Errata RHSA-2026:19043 0 None None None 2026-05-19 13:06:29 UTC
Red Hat Product Errata RHSA-2026:19200 0 None None None 2026-05-19 18:00:58 UTC

Description OSIDB Bzimport 2026-04-01 11:32:27 UTC
Integer overflow (wraparound) vulnerability in Corosync’s join message sanity validation in exec/totemsrp.c. The flaw is in check_memb_join_sanity(), where proc_list_entries and failed_list_entries are attacker-controlled 32-bit unsigned values received from the network and are added together before being promoted to size_t. This allows the addition (proc_list_entries + failed_list_entries) to wrap around in 32-bit arithmetic (e.g., 0x80000000 + 0x80000000 = 0), causing required_len to be calculated too small and allowing a short packet to pass validation. As a result, Corosync proceeds with processing malformed input that should have been rejected, which can be exploited remotely without authentication in totemudp/totemudpu mode via crafted UDP packets to crash the service, resulting in a denial of service.

Comment 2 errata-xmlrpc 2026-05-05 09:18:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:13644 https://access.redhat.com/errata/RHSA-2026:13644

Comment 3 errata-xmlrpc 2026-05-05 10:04:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:13657 https://access.redhat.com/errata/RHSA-2026:13657

Comment 4 errata-xmlrpc 2026-05-05 10:23:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:13673 https://access.redhat.com/errata/RHSA-2026:13673

Comment 5 errata-xmlrpc 2026-05-06 15:47:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:14205 https://access.redhat.com/errata/RHSA-2026:14205

Comment 6 errata-xmlrpc 2026-05-06 16:10:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:14211 https://access.redhat.com/errata/RHSA-2026:14211

Comment 7 errata-xmlrpc 2026-05-06 16:15:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:14215 https://access.redhat.com/errata/RHSA-2026:14215

Comment 8 errata-xmlrpc 2026-05-06 16:15:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:14210 https://access.redhat.com/errata/RHSA-2026:14210

Comment 9 errata-xmlrpc 2026-05-06 16:20:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:14214 https://access.redhat.com/errata/RHSA-2026:14214

Comment 10 errata-xmlrpc 2026-05-06 16:25:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:14216 https://access.redhat.com/errata/RHSA-2026:14216

Comment 11 errata-xmlrpc 2026-05-06 16:27:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:14212 https://access.redhat.com/errata/RHSA-2026:14212

Comment 12 errata-xmlrpc 2026-05-06 16:30:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:14213 https://access.redhat.com/errata/RHSA-2026:14213

Comment 13 errata-xmlrpc 2026-05-19 13:06:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19043 https://access.redhat.com/errata/RHSA-2026:19043

Comment 14 errata-xmlrpc 2026-05-19 18:00:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19200 https://access.redhat.com/errata/RHSA-2026:19200


Note You need to log in before you can comment on or make changes to this bug.