CVE-2026-35091
EUVD-2026-1787901.04.2026, 14:16
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contentsEnginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| corosync | corosync | - |
| redhat | openshift | 4.0 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux | 10.0 |
𝑥
= Vulnerable software versions
Red Hat Enterprise Linux Releases
Red Hat Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| corosync |
| ||||||||||||||
| corosync-vqsim |
| ||||||||||||||
| corosynclib |
| ||||||||||||||
| corosynclib-devel |
| ||||||||||||||
| spausedd |
|
Common Weakness Enumeration
References