CVE-2026-35091
β οΈ highSummary
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
CVSS Score
8.2
High
EPSS Score
0.3
Exploit Probability
Published Date
2026-04-01
First Seen: 2026-04-08
π Relative Risk Intelligence
This CVE is High Risk - more severe than 79.7% of all 318,071 vulnerabilities in our database.
#64,561
Top 25% most severe
Severity Percentile
π― CISA SSVC Assessment Updated: Apr 1, 2026
π Exploitation Status
None
No known exploits
βοΈ Automatable
YES
Can be exploited automatically
π₯ Technical Impact
Partial
Limited system impact
π Discovered By
Red Hat would like to thank SebastiΓ‘n Alba Vives for reporting this issue.
SSVC data provided by
CISA
Last Modified
2026-04-07
Source
NVD π
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
CWE IDs (Weakness Types)