CVE-2026-35091
HIGH
8,2
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: high
Description
AI Translation Available
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
253
Incorrect Check of Function Return Value
IncompleteCommon Consequences
Security Scopes Affected:
Availability
Integrity
Potential Impacts:
Unexpected State
Dos: Crash, Exit, Or Restart
Applicable Platforms
All platforms may be affected
https://access.redhat.com/security/cve/CVE-2026-35091
https://bugzilla.redhat.com/show_bug.cgi?id=2453169
https://bugzilla.redhat.com/show_bug.cgi?id=2453813