CVE-2026-35091
Out-of-Bounds Read in Corosync UDP Causes DoS, Data Leak
Publication date: 2026-04-01
Last updated on: 2026-05-06
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | openshift | 4.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux | 10.0 |
| corosync | corosync | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-253 | The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-35091 is a vulnerability in Corosync's handling of membership commit tokens. Specifically, a function called check_memb_commit_token_sanity() incorrectly validates incoming messages by returning success even when the message is truncated and smaller than expected. This causes the program to process attacker-controlled, undersized input, leading to an out-of-bounds read in memory.
An unauthenticated remote attacker can exploit this by sending a specially crafted UDP packet to the Corosync UDP port (default 5405) when Corosync is running in its default totemudp/totemudpu mode.
The result of this flaw can cause a denial of service (DoS) due to the out-of-bounds read and may also lead to limited disclosure of memory contents.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Corosync can lead to a denial of service (DoS) and potentially disclose limited memory contents due to an out-of-bounds read. This limited information disclosure could pose risks related to data confidentiality.
However, there is no specific information provided about the nature of the disclosed memory contents or whether any personal or sensitive data protected under standards like GDPR or HIPAA could be exposed.
Therefore, while the vulnerability could impact system availability and potentially leak some memory data, the provided information does not explicitly link it to compliance violations with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a remote attacker to cause a denial of service (DoS) on systems running the vulnerable Corosync versions. The attacker can crash or disrupt the service by exploiting the out-of-bounds read.
Additionally, there is a potential for limited information disclosure, where some memory contents might be leaked to the attacker, which could expose sensitive data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious UDP packets sent to the Corosync default UDP port 5405, especially those that are malformed or truncated and could trigger the out-of-bounds read.
A practical approach is to capture and analyze network traffic on port 5405 using tools like tcpdump or Wireshark to identify any unusual or crafted UDP packets targeting Corosync.
- Use tcpdump to capture UDP packets on port 5405: sudo tcpdump -i <interface> udp port 5405 -w corosync_traffic.pcap
- Analyze the captured packets with Wireshark or tshark to look for truncated or malformed membership commit token messages.
- Check Corosync logs for any crashes or denial of service symptoms that may indicate exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the Corosync UDP port 5405 to trusted hosts only, using firewall rules to block unauthorized UDP traffic to this port.
Additionally, updating Corosync to a patched version that fixes the membership commit token sanity check vulnerability is strongly recommended.
If an update is not immediately available, consider disabling or restricting the totemudp/totemudpu mode if possible, or isolating the affected systems from untrusted networks.