CVE-2023-42459

NameCVE-2023-42459
DescriptionFast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). In affected versions specific DATA submessages can be sent to a discovery locator which may trigger a free error. This can remotely crash any Fast-DDS process. The call to free() could potentially leave the pointer in the attackers control which could lead to a double free. This issue has been addressed in versions 2.12.0, 2.11.3, 2.10.3, and 2.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5568-1
Debian Bugs1054163

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fastdds (PTS)bullseye (security), bullseye2.1.0+ds-9+deb11u1fixed
bookworm, bookworm (security)2.9.1+ds-1+deb12u2fixed
sid, trixie2.14.0+ds-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fastddssourcebullseye(not affected)
fastddssourcebookworm2.9.1+ds-1+deb12u2DSA-5568-1
fastddssource(unstable)2.11.2+ds-61054163

Notes

[bullseye] - fastdds <not-affected> (Vulnerable code not present)
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm
https://github.com/eProsima/Fast-DDS/issues/3207
https://github.com/eProsima/Fast-DDS/pull/3824
https://github.com/eProsima/Fast-DDS/commit/1e978c6f3d0ca1df6b323b37fd4902b0762ececb

Search for package or bug name: Reporting problems