A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
Use CWE-253, Corosync vendor hub and Corosync product page to widen CVE-2026-35091 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-30472, CVE-2026-35092 and CVE-2018-1084 for nearby disclosures in the same product family.