CVE-2026-35092
- EPSS 0.27%
- Veröffentlicht 01.04.2026 13:18:55
- Zuletzt bearbeitet 06.05.2026 21:16:00
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading ...
CVE-2026-35091
- EPSS 0.99%
- Veröffentlicht 01.04.2026 13:18:53
- Zuletzt bearbeitet 13.05.2026 08:16:16
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to a...
CVE-2025-30472
- EPSS 0.16%
- Veröffentlicht 22.03.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 19:15:49
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVE-2018-1084
- EPSS 0.31%
- Veröffentlicht 12.04.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:08
corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
- EPSS 0.94%
- Veröffentlicht 06.06.2014 14:55:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
The init_nss_hash function in exec/totemcrypto.c in Corosync 2.0 before 2.3 does not properly initialize the HMAC key, which allows remote attackers to cause a denial of service (crash) via a crafted packet.