Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35091: Incorrect Check of Function Return Value in Red Hat Red Hat Enterprise Linux 10

0
High
VulnerabilityCVE-2026-35091cvecve-2026-35091
Published: Wed Apr 01 2026 (04/01/2026, 13:18:53 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 13:54:04 UTC

Technical Analysis

CVE-2026-35091 identifies a critical vulnerability in Corosync, a cluster communication framework integral to Red Hat Enterprise Linux 10's high-availability and clustering solutions. The vulnerability stems from an incorrect validation of the return value in the membership commit token sanity check within the totemudp (UDP-based) communication mode, which is the default operational mode. Specifically, when Corosync processes a crafted UDP packet, it fails to properly handle the return value, leading to an out-of-bounds read in memory. This memory access violation can cause the Corosync service to crash, resulting in a denial of service (DoS) condition. Additionally, the out-of-bounds read may expose limited memory contents, potentially leaking sensitive information. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote attackers. The flaw affects all deployments of Red Hat Enterprise Linux 10 using Corosync in its default totemudp mode. While no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized for disruption or limited data leakage. The CVSS v3.1 base score of 8.2 reflects the high impact on availability and confidentiality, combined with the low complexity and no privileges required for exploitation. This vulnerability underscores the importance of rigorous input validation and return value checking in network protocol implementations within critical infrastructure components.

Potential Impact

The primary impact of CVE-2026-35091 is the potential for denial of service against systems running Red Hat Enterprise Linux 10 with Corosync in totemudp mode. This can disrupt cluster communications and high-availability services, potentially causing downtime in critical environments such as data centers, cloud infrastructure, and enterprise applications relying on clustering. The out-of-bounds read also introduces a limited information disclosure risk, which could aid attackers in reconnaissance or further exploitation, although the extent of leaked data is constrained. The vulnerability's remote, unauthenticated nature increases the attack surface, allowing adversaries to launch attacks from anywhere with network access to affected systems. Organizations relying on Corosync for cluster management may experience service interruptions, degraded performance, or exposure of sensitive memory data. This can lead to operational disruptions, financial losses, and reputational damage. Given the default configuration usage, many deployments are likely affected, amplifying the global risk. The absence of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for mitigation due to the vulnerability's high severity and ease of exploitation.

Mitigation Recommendations

To mitigate CVE-2026-35091, organizations should prioritize applying patches or updates from Red Hat as soon as they become available, as these will address the root cause of the vulnerability. In the interim, network-level controls should be implemented to restrict access to UDP ports used by Corosync (typically port 5405) to trusted hosts only, minimizing exposure to untrusted networks. Deploying firewall rules or network segmentation can reduce the attack surface. Monitoring network traffic for anomalous or malformed UDP packets targeting Corosync can help detect exploitation attempts. Additionally, administrators should review cluster configurations to ensure minimal exposure and consider temporarily disabling or restricting totemudp mode if operationally feasible. Regularly auditing and updating cluster software components and dependencies will help prevent similar vulnerabilities. Finally, organizations should maintain robust incident response plans to quickly address any exploitation attempts or service disruptions related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-04-01T11:35:23.145Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd1fdee6bfc5ba1dd19c0b

Added to database: 4/1/2026, 1:38:38 PM

Last enriched: 4/1/2026, 1:54:04 PM

Last updated: 4/3/2026, 10:27:44 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses