Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orftokenendian_convert in exec/totemsrp.c via a large UDP packet.
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-59189.json"