<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Corosync — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/corosync/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 14:16:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/corosync/feed.xml" rel="self" type="application/rss+xml"/><item><title>Corosync Integer Overflow Vulnerability (CVE-2026-35092) Leads to DoS</title><link>https://feed.craftedsignal.io/briefs/2026-04-corosync-dos/</link><pubDate>Wed, 01 Apr 2026 14:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-corosync-dos/</guid><description>CVE-2026-35092 is an integer overflow vulnerability in Corosync's join message sanity validation, allowing a remote, unauthenticated attacker to send crafted UDP packets, resulting in a denial of service condition.</description><content:encoded><![CDATA[<p>CVE-2026-35092 describes an integer overflow vulnerability found in Corosync, a cluster engine. This vulnerability resides in the join message sanity validation process. A remote, unauthenticated attacker can exploit this flaw by sending specially crafted User Datagram Protocol (UDP) packets to a vulnerable Corosync instance. Successful exploitation leads to a service crash, effectively causing a denial of service (DoS). The vulnerability specifically targets Corosync deployments utilizing the totemudp or totemudpu modes. Defenders should be aware of unusual UDP traffic patterns directed towards Corosync instances, especially those configured with totemudp/totemudpu.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Corosync instance running in totemudp/totemudpu mode.</li>
<li>The attacker crafts a malicious UDP packet designed to trigger an integer overflow in the join message sanity validation.</li>
<li>The attacker sends the crafted UDP packet to the targeted Corosync instance.</li>
<li>The Corosync service receives the malicious UDP packet.</li>
<li>The join message sanity validation process attempts to process the malformed packet, leading to an integer overflow.</li>
<li>The integer overflow causes a crash within the Corosync service.</li>
<li>The Corosync service terminates or becomes unresponsive.</li>
<li>Legitimate cluster communications are disrupted, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35092 results in a denial-of-service condition, disrupting cluster communications and potentially impacting critical services relying on Corosync for high availability. The impact is significant for organizations using Corosync clusters to maintain service uptime, as a crash can lead to service outages. While the specific number of vulnerable deployments is unknown, organizations utilizing Corosync, especially in totemudp/totemudpu mode, are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor UDP traffic for unusual patterns indicative of exploitation attempts targeting Corosync instances.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Corosync UDP Traffic</code> to identify potentially malicious UDP packets sent to Corosync instances.</li>
<li>Investigate any detected instances of <code>CWE-190</code> (Integer Overflow or Wraparound) related to Corosync processes.</li>
<li>Refer to Red Hat&rsquo;s security advisory (<a href="https://access.redhat.com/security/cve/CVE-2026-35092">https://access.redhat.com/security/cve/CVE-2026-35092</a>) for potential patches or mitigations as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-35092</category><category>denial-of-service</category><category>corosync</category></item></channel></rss>