Source: fastdds
Version: 2.11.2+ds-6.1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 2.11.2+ds-6

Hi,

The following vulnerability was published for fastdds.

CVE-2023-50716[0]:
| eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation of
| the Data Distribution Service standard of the Object Management
| Group. Prior to versions 2.13.0, 2.12.2, 2.11.3, 2.10.3, and 2.6.7,
| an invalid DATA_FRAG Submessage causes a bad-free error, and the
| Fast-DDS process can be remotely terminated. If an invalid Data_Frag
| packet is sent, the `Inline_qos, SerializedPayload` member of object
| `ch` will attempt to release memory without initialization,
| resulting in a 'bad-free' error. Versions 2.13.0, 2.12.2, 2.11.3,
| 2.10.2, and 2.6.7 fix this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-50716
    https://www.cve.org/CVERecord?id=CVE-2023-50716
[1] https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-5m2f-hvj2-cx2h

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to