A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-35091 | Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453169 | Exploit Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453813 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
07 Apr 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2026-35091 - Third Party Advisory, VDB Entry | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453169 - Exploit, Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453813 - Issue Tracking | |
| CPE | cpe:2.3:a:redhat:openshift:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:corosync:corosync:-:*:*:*:*:*:*:* |
|
| First Time |
Redhat
Redhat enterprise Linux Redhat openshift Corosync Corosync corosync |
01 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 14:16
Updated : 2026-04-07 16:34
NVD link : CVE-2026-35091
Mitre link : CVE-2026-35091
CVE.ORG link : CVE-2026-35091
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift
corosync
- corosync
CWE
CWE-253
Incorrect Check of Function Return Value
