| Name | CVE-2025-62799 |
| Description | Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1121097 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| fastdds (PTS) | bullseye (security), bullseye | 2.1.0+ds-9+deb11u1 | vulnerable |
| bookworm, bookworm (security) | 2.9.1+ds-1+deb12u2 | vulnerable | |
| trixie | 3.1.2+ds-1 | vulnerable | |
| forky, sid | 3.3.0+ds-3 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| fastdds | source | (unstable) | (unfixed) | 1121097 |
[trixie] - fastdds <no-dsa> (Minor issue)
[bookworm] - fastdds <no-dsa> (Minor issue)
[bullseye] - fastdds <postponed> (Minor issue)
Fixed by: https://github.com/eProsima/Fast-DDS/commit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659 (v3.4.1)