Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
References
| Link | Resource |
|---|---|
| https://corosync.org | Product |
| https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613b0/exec/totemsrp.c#L4677 | Product |
| https://github.com/corosync/corosync/issues/778 | Exploit Issue Tracking |
| https://github.com/corosync/corosync/issues/778 | Exploit Issue Tracking |
Configurations
History
01 Apr 2025, 20:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://corosync.org - Product | |
| References | () https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613b0/exec/totemsrp.c#L4677 - Product | |
| References | () https://github.com/corosync/corosync/issues/778 - Exploit, Issue Tracking | |
| CPE | cpe:2.3:a:corosync:corosync:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 | |
| First Time |
Corosync corosync
Corosync |
25 Mar 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/corosync/corosync/issues/778 - | |
| Summary |
|
22 Mar 2025, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-22 02:15
Updated : 2025-04-01 20:28
NVD link : CVE-2025-30472
Mitre link : CVE-2025-30472
CVE.ORG link : CVE-2025-30472
JSON object : View
Products Affected
corosync
- corosync
