CVE-2025-30472

NameCVE-2025-30472
DescriptionCorosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1102006

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
corosync (PTS)bullseye3.1.2-2vulnerable
bookworm3.1.7-1vulnerable
sid, trixie3.1.9-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
corosyncsource(unstable)(unfixed)1102006

Notes

[bookworm] - corosync <no-dsa> (Minor issue)
[bullseye] - corosync <postponed> (Minor issue)
https://github.com/corosync/corosync/issues/778
https://github.com/corosync/corosync/pull/779
https://github.com/corosync/corosync/commit/7839990f9cdf34e55435ed90109e82709032466a

Search for package or bug name: Reporting problems