UNKNOWNCVE-2026-35091

CVE-2026-35091: Corosync DoS Vulnerability in totemudp Mode

Platform

linux

Component

corosync

Fixed in

2.5.4

CVE-2026-35091 describes a denial-of-service (DoS) vulnerability found in Corosync. Specifically, a remote, unauthenticated attacker can exploit a flaw in the membership commit token sanity check by sending a specially crafted UDP packet. This can lead to an out-of-bounds read, causing a DoS and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration. Currently, there is no official patch available.

How to fix

Actualice Corosync a la versión 2.5.4 o superior para mitigar la vulnerabilidad.  Asegúrese de que Corosync no esté configurado para usar el modo totemudp/totemudpu, ya que este es el modo vulnerable.  Revise las notas de la versión para obtener instrucciones específicas de actualización para su distribución.

Frequently asked questions

What is CVE-2026-35091?

CVE-2026-35091 is a denial-of-service (DoS) vulnerability in Corosync. It allows a remote attacker to cause a DoS by sending a crafted UDP packet, leading to an out-of-bounds read.

Am I affected by CVE-2026-35091?

You are affected if you are running Corosync in totemudp/totemudpu mode, which is the default configuration. An attacker could potentially cause a denial of service.

How can I fix or mitigate CVE-2026-35091?

Currently, there is no official patch available. Monitor Corosync's security advisories for updates and consider disabling totemudp/totemudpu mode if possible as a temporary mitigation.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free