Zurück zur CVE-Übersicht
CVE-2026-35092
HIGH(7.5)CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Risk Signal Score19/100 — NIEDRIG
- CVSS 7.5 — Hoch
EPSS-Score
0%
Exploit-Wahrscheinlichkeit (30 Tage)
CVSS Score
7.5
Technische Schwere
Beschreibung
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
Referenzen
- https://access.redhat.com/errata/RHSA-2026:13644
- https://access.redhat.com/errata/RHSA-2026:13657
- https://access.redhat.com/errata/RHSA-2026:13673
- https://access.redhat.com/errata/RHSA-2026:14205
- https://access.redhat.com/errata/RHSA-2026:14212
- https://access.redhat.com/errata/RHSA-2026:14213
- https://access.redhat.com/errata/RHSA-2026:14214
- https://access.redhat.com/errata/RHSA-2026:14215
- https://access.redhat.com/errata/RHSA-2026:14216
- https://access.redhat.com/security/cve/CVE-2026-35092