{"schema_version":"1.7.2","id":"OESA-2026-1964","modified":"2026-04-17T13:02:36Z","published":"2026-04-17T13:02:36Z","upstream":["CVE-2026-35091","CVE-2026-35092"],"summary":"corosync security update","details":"This package contains the Corosync Cluster Engine Executive, several default APIs and libraries, default configuration files, and an init script.\r\n\r\nSecurity Fix(es):\n\nA flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.(CVE-2026-35091)\n\nA flaw was found in Corosync. An integer overflow vulnerability in Corosync&apos;s join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.(CVE-2026-35092)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"corosync","purl":"pkg:rpm/openEuler/corosync&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-7.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["corosync-3.0.2-7.oe2003sp4.aarch64.rpm","corosync-debuginfo-3.0.2-7.oe2003sp4.aarch64.rpm","corosync-debugsource-3.0.2-7.oe2003sp4.aarch64.rpm","corosync-vqsim-3.0.2-7.oe2003sp4.aarch64.rpm","corosynclib-3.0.2-7.oe2003sp4.aarch64.rpm","corosynclib-devel-3.0.2-7.oe2003sp4.aarch64.rpm","spausedd-3.0.2-7.oe2003sp4.aarch64.rpm"],"src":["corosync-3.0.2-7.oe2003sp4.src.rpm"],"x86_64":["corosync-3.0.2-7.oe2003sp4.x86_64.rpm","corosync-debuginfo-3.0.2-7.oe2003sp4.x86_64.rpm","corosync-debugsource-3.0.2-7.oe2003sp4.x86_64.rpm","corosync-vqsim-3.0.2-7.oe2003sp4.x86_64.rpm","corosynclib-3.0.2-7.oe2003sp4.x86_64.rpm","corosynclib-devel-3.0.2-7.oe2003sp4.x86_64.rpm","spausedd-3.0.2-7.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1964"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35091"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35092"}],"database_specific":{"severity":"High"}}
