CVE-2026-35091: Corosync DoS Vulnerability in totemudp Mode
Platform
linux
Component
corosync
Fixed in
2.5.4
CVE-2026-35091 describes a denial-of-service (DoS) vulnerability found in Corosync. Specifically, a remote, unauthenticated attacker can exploit a flaw in the membership commit token sanity check by sending a specially crafted UDP packet. This can lead to an out-of-bounds read, causing a DoS and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration. Currently, there is no official patch available.
How to fix
Actualice Corosync a la versión 2.5.4 o superior para mitigar la vulnerabilidad. Asegúrese de que Corosync no esté configurado para usar el modo totemudp/totemudpu, ya que este es el modo vulnerable. Revise las notas de la versión para obtener instrucciones específicas de actualización para su distribución.
Frequently asked questions
What is CVE-2026-35091?
CVE-2026-35091 is a denial-of-service (DoS) vulnerability in Corosync. It allows a remote attacker to cause a DoS by sending a crafted UDP packet, leading to an out-of-bounds read.
Am I affected by CVE-2026-35091?
You are affected if you are running Corosync in totemudp/totemudpu mode, which is the default configuration. An attacker could potentially cause a denial of service.
How can I fix or mitigate CVE-2026-35091?
Currently, there is no official patch available. Monitor Corosync's security advisories for updates and consider disabling totemudp/totemudpu mode if possible as a temporary mitigation.
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free