CVE-2025-30472

Publication date 22 March 2025

Last updated 27 March 2025


Ubuntu priority

Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.

Read the notes from the security team

Status

Package Ubuntu Release Status
corosync 24.10 oracular
Needs evaluation
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Notes


mdeslaur

Because of stack-protector, this is likely a denial of service only from an authenticated user.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
corosync