Vulnerability Description
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Corosync | Corosync | <= 3.1.9 |
Related Weaknesses (CWE)
References
- https://corosync.orgProduct
- https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613Product
- https://github.com/corosync/corosync/issues/778ExploitIssue Tracking
- https://lists.debian.org/debian-lts-announce/2025/09/msg00023.html
- https://github.com/corosync/corosync/issues/778ExploitIssue Tracking
FAQ
What is CVE-2025-30472?
CVE-2025-30472 is a vulnerability with a CVSS score of 9.0 (CRITICAL). Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
How severe is CVE-2025-30472?
CVE-2025-30472 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-30472?
Check the references section above for vendor advisories and patch information. Affected products include: Corosync Corosync.