Source: fastdds Version: 2.11.2+ds-6.1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 2.11.2+ds-6
Hi, The following vulnerability was published for fastdds. CVE-2023-50716[0]: | eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation of | the Data Distribution Service standard of the Object Management | Group. Prior to versions 2.13.0, 2.12.2, 2.11.3, 2.10.3, and 2.6.7, | an invalid DATA_FRAG Submessage causes a bad-free error, and the | Fast-DDS process can be remotely terminated. If an invalid Data_Frag | packet is sent, the `Inline_qos, SerializedPayload` member of object | `ch` will attempt to release memory without initialization, | resulting in a 'bad-free' error. Versions 2.13.0, 2.12.2, 2.11.3, | 2.10.2, and 2.6.7 fix this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-50716 https://www.cve.org/CVERecord?id=CVE-2023-50716 [1] https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-5m2f-hvj2-cx2h Please adjust the affected versions in the BTS as needed. Regards, Salvatore