CVE-2025-30472

NameCVE-2025-30472
DescriptionCorosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
corosync (PTS)bullseye3.1.2-2vulnerable
bookworm3.1.7-1vulnerable
sid, trixie3.1.9-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
corosyncsource(unstable)(unfixed)

Notes

https://github.com/corosync/corosync/issues/778

Search for package or bug name: Reporting problems