We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30472



Description

Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.

Reserved 2025-03-22 | Published 2025-03-22 | Updated 2025-03-25 | Assigner mitre


CRITICAL: 9.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

Any version
affected

References

github.com/...8ebb1903897c792065cb5e876613b0/exec/totemsrp.c

github.com/corosync/corosync/issues/778

corosync.org

cve.org (CVE-2025-30472)

nvd.nist.gov (CVE-2025-30472)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30472

Support options

Helpdesk Chat, Email, Knowledgebase