Description

A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.

INFO

Published Date :

2026-04-01T13:18:53.738Z

Last Modified :

2026-05-06T20:40:45.680Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-35091 vulnerability.

Vendors Products
Corosync
  • Corosync
Redhat
  • Enterprise Linux
  • Enterprise Linux Eus
  • Openshift
  • Openshift Container Platform
  • Rhel Aus
  • Rhel E4s
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact