CVE-2026-35091

Published Apr 1, 2026

Last updated a day ago

Overview

Description
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
Source
secalert@redhat.com
NVD status
Analyzed
Products
corosync, openshift, enterprise_linux

Risk scores

CVSS 3.1

Type
Primary
Base score
8.2
Impact score
4.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Severity
HIGH

Weaknesses

secalert@redhat.com
CWE-253

Social media

Hype score
Not currently trending

Configurations