corosync-3.1.9-2.el9_7.1
エラータID: AXSA:2026-591:01
The corosync packages provide the Corosync Cluster Engine and C APIs for MIRACLE LINUX cluster software.
Security Fix(es):
* corosync: Corosync: Denial of Service and information disclosure via crafted UDP packet (CVE-2026-35091)
* corosync: Corosync: Denial of Service via integer overflow in join message validation (CVE-2026-35092)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-35091
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
CVE-2026-35092
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
Update packages.
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
N/A
SRPMS
- corosync-3.1.9-2.el9_7.1.src.rpm
MD5: 74a5b37bee22a20765882e0ed37593c0
SHA-256: 49660bc287f7eb75985df0d94d1c3685b7847636bb14e42d882e9163d42397f4
Size: 1.14 MB
Asianux Server 9 for x86_64
- corosync-3.1.9-2.el9_7.1.x86_64.rpm
MD5: 2221efaa557fccf80ad93deff0646418
SHA-256: ec78b5c37f74fa923345e14f05b02ffeabdd35668a28186305b0a6b2ced311d2
Size: 270.65 kB - corosynclib-3.1.9-2.el9_7.1.i686.rpm
MD5: 2b8c55a1c6618210f74497ecdb302866
SHA-256: 861a013c2a4cdde44614664d9c686586a8a2ce20e850cbb8bb6ad5a70175ad26
Size: 52.43 kB - corosynclib-3.1.9-2.el9_7.1.x86_64.rpm
MD5: 886e5564f7afa0d9526ed0b3aeda37eb
SHA-256: eb6f7c5f0543f007c0dc87f1cc5b85cd3c5181805af28b8ddc448b303af0234c
Size: 49.32 kB - corosynclib-devel-3.1.9-2.el9_7.1.i686.rpm
MD5: 217e9615209d3c9b41224ed997305083
SHA-256: 7f159123330ab74f0328cd532e931e029e3b7f92b7702e6a80deb72ff9268678
Size: 190.19 kB - corosynclib-devel-3.1.9-2.el9_7.1.x86_64.rpm
MD5: bf13477e81e57fbab565f4a225366e95
SHA-256: a1e3151cdd0f8a5bef12d9af65ad41008af0feb538d45a432f412762a245257a
Size: 190.25 kB - corosync-vqsim-3.1.9-2.el9_7.1.x86_64.rpm
MD5: 388630d876e12436ed42f27da8703b92
SHA-256: 094e14898392b0ca2565369ca29b2c779b8dcafc823366d17f19c9b117c66068
Size: 63.19 kB