Количество 11
Количество 11
BDU:2025-03217
Уязвимость функции orf_token_endian_convert() системы группового общения для отказоустойчивых кластеров Corosync, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
ROS-20250630-06
Уязвимость corosync
CVE-2025-30472
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVE-2025-30472
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVE-2025-30472
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVE-2025-30472
Corosync through 3.1.9, if encryption is disabled or the attacker know ...
SUSE-SU-2025:1084-1
Security update for corosync
RLSA-2025:7478
Moderate: corosync security update
GHSA-4q2r-xgxr-vvqm
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
ELSA-2025-7478
ELSA-2025-7478: corosync security update (MODERATE)
ELSA-2025-7201
ELSA-2025-7201: corosync security update (MODERATE)
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
BDU:2025-03217 Уязвимость функции orf_token_endian_convert() системы группового общения для отказоустойчивых кластеров Corosync, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании  | CVSS3: 9  | 0% Низкий | 8 месяцев назад | |
ROS-20250630-06 Уязвимость corosync  | CVSS2: 7.6  | 0% Низкий | 4 месяца назад | |
CVE-2025-30472 Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.  | CVSS3: 9  | 0% Низкий | 8 месяцев назад | |
CVE-2025-30472 Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.  | CVSS3: 6.6  | 0% Низкий | 8 месяцев назад | |
CVE-2025-30472 Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.  | CVSS3: 9  | 0% Низкий | 8 месяцев назад | |
CVE-2025-30472 Corosync through 3.1.9, if encryption is disabled or the attacker know ...  | CVSS3: 9  | 0% Низкий | 8 месяцев назад | |
SUSE-SU-2025:1084-1 Security update for corosync  | 0% Низкий | 7 месяцев назад | ||
RLSA-2025:7478 Moderate: corosync security update  | 0% Низкий | около 1 месяца назад | ||
GHSA-4q2r-xgxr-vvqm Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.  | CVSS3: 9  | 0% Низкий | 8 месяцев назад | |
ELSA-2025-7478 ELSA-2025-7478: corosync security update (MODERATE)  | 4 месяца назад | |||
ELSA-2025-7201 ELSA-2025-7201: corosync security update (MODERATE)  | 6 месяцев назад | 
Уязвимостей на страницу