GHSA-hmg2-5h4j-37m9HighCVSS 8.2
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value...
🔗 CVE IDs covered (1)
📋 Description
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
🔗 References (18)
- https://nvd.nist.gov/vuln/detail/CVE-2026-35091
- https://access.redhat.com/security/cve/CVE-2026-35091
- https://bugzilla.redhat.com/show_bug.cgi?id=2453169
- https://bugzilla.redhat.com/show_bug.cgi?id=2453813
- https://access.redhat.com/errata/RHSA-2026:13644
- https://access.redhat.com/errata/RHSA-2026:13657
- https://access.redhat.com/errata/RHSA-2026:13673
- https://access.redhat.com/errata/RHSA-2026:14205
- https://access.redhat.com/errata/RHSA-2026:14212
- https://access.redhat.com/errata/RHSA-2026:14213
- https://access.redhat.com/errata/RHSA-2026:14214
- https://access.redhat.com/errata/RHSA-2026:14215
- https://access.redhat.com/errata/RHSA-2026:14216
- https://access.redhat.com/errata/RHSA-2026:14210
- https://access.redhat.com/errata/RHSA-2026:14211
- https://access.redhat.com/errata/RHSA-2026:19043
- https://access.redhat.com/errata/RHSA-2026:19200
- https://github.com/advisories/GHSA-hmg2-5h4j-37m9