Impact
A flaw in Corosync allows a remote unauthenticated attacker to send crafted UDP packets that trigger an integer overflow during join message sanity validation, causing the Corosync service to crash and resulting in a denial of service. The weakness is an integer overflow (CWE‑190) that can be triggered by malformed totemudp/TOTEMUDPU join messages.
Affected Systems
Red Hat Enterprise Linux 10, 7, 8, and 9, as well as Red Hat OpenShift Container Platform 4, are affected when Corosync is configured to use the totemudp/totemudpu mode. Specific Corosync or OS version numbers are not enumerated in the advisory.
Risk and Exploitability
The CVSS score of 7.5 indicates a medium to high severity level. The EPSS score is less than 1 %, signifying a low probability that this flaw will be exploited, and it does not appear in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted UDP packets to Corosync’s default port 5405; the malformed join messages trigger an integer overflow during validation, causing the service to crash. This denial of service can be repeated until the service is manually restarted, potentially disrupting cluster operations.
OpenCVE Enrichment
Ubuntu USN