[CLSA-2025:1747251688] corosync: Fix of CVE-2025-30472
Type:
security
Severity:
Critical
Release date:
2025-05-14 19:41:33 UTC
Description:
- CVE-2025-30472: fix stack-based buffer overflow in orf_token_endian_convert by adding input validation for large UDP packets
Updated packages:
  • corosync-3.1.7-1.el9.tuxcare.els1.x86_64.rpm
    sha:7e86e5f90e1eeb6dd3f45230888dd07d602e9377c26992a61615dfc0d0380f80
  • corosync-vqsim-3.1.7-1.el9.tuxcare.els1.x86_64.rpm
    sha:3cf33ca8ff91442c6aaefea3c3b12035487cf2d33bdb604b468ebdf17333f57a
  • corosynclib-3.1.7-1.el9.tuxcare.els1.i686.rpm
    sha:2498169bc55ab45b1f1effe1dfbb6a4375064c1cb0f174803bca2ed4fe0d78c0
  • corosynclib-3.1.7-1.el9.tuxcare.els1.x86_64.rpm
    sha:d892fd07042920f8ad47c72e0a079e525bcc1bc32bc5cfce63b1af53b65e0bc5
  • corosynclib-devel-3.1.7-1.el9.tuxcare.els1.i686.rpm
    sha:baf1d6b98822f9f0560ed15e655e7a0ad092708d8af589501eb38d0e6a2e8712
  • corosynclib-devel-3.1.7-1.el9.tuxcare.els1.x86_64.rpm
    sha:7166d59ca13d7329969eb7cf826d82273f5765c3da53f27870143a1e5df3fde4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.