Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
References
| Link | Resource |
|---|---|
| https://corosync.org | Product |
| https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613b0/exec/totemsrp.c#L4677 | Product |
| https://github.com/corosync/corosync/issues/778 | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2025/09/msg00023.html | |
| https://github.com/corosync/corosync/issues/778 | Exploit Issue Tracking |
Configurations
History
03 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-03-22 02:15
Updated : 2025-11-03 19:15
NVD link : CVE-2025-30472
Mitre link : CVE-2025-30472
CVE.ORG link : CVE-2025-30472
JSON object : View
Products Affected
corosync
- corosync
