CVE-2024-28231 Affecting fastdds package, versions <2.14.0+ds-2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-FASTDDS-6474270
  • published21 Mar 2024
  • disclosed20 Mar 2024

Introduced: 20 Mar 2024

CVE-2024-28231  (opens in a new tab)

How to fix?

Upgrade Debian:13 fastdds to version 2.14.0+ds-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fastdds package and not the fastdds package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue.