We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
Reserved 2025-03-22 | Published 2025-03-22 | Updated 2025-03-25 | Assigner mitreCWE-121 Stack-based Buffer Overflow
github.com/...8ebb1903897c792065cb5e876613b0/exec/totemsrp.c
github.com/corosync/corosync/issues/778
Support options