Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7201 https://access.redhat.com/errata/RHSA-2025:7201
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:7478 https://access.redhat.com/errata/RHSA-2025:7478