{"id":"CVE-2025-30472","details":"Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.","modified":"2026-04-16T04:31:34.031963420Z","published":"2025-03-22T02:15:16.620Z","related":["ALSA-2025:7201","ALSA-2025:7478","SUSE-SU-2025:1084-1","openSUSE-SU-2025:14933-1"],"references":[{"type":"WEB","url":"https://github.com/corosync/corosync/blob/73ba225cc48ebb1903897c792065cb5e876613b0/exec/totemsrp.c#L4677"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/09/msg00023.html"},{"type":"WEB","url":"https://corosync.org"},{"type":"REPORT","url":"https://github.com/corosync/corosync/issues/778"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/corosync/corosync","events":[{"introduced":"0"},{"last_affected":"4e683699b97740562db11f60c744b0f7f61916dd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.9"}]}}],"versions":["v1.8.0pre","v1.99.0","v1.99.1","v1.99.2","v1.99.3","v1.99.4","v1.99.5","v1.99.6","v1.99.7","v1.99.8","v1.99.9","v2.0.0","v2.0.1","v2.1.0","v2.2.0","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.6","v2.4.0","v2.4.1","v2.99.0","v2.99.1","v2.99.2","v2.99.3","v2.99.4","v2.99.5","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30472.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}