Use After Free Affecting fastdds package, versions <2.14.0+ds-2


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.54% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN14-FASTDDS-11741664
  • published10 Aug 2025
  • disclosed6 Mar 2024

Introduced: 6 Mar 2024

CVE-2023-50716  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Debian:14 fastdds to version 2.14.0+ds-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fastdds package and not the fastdds package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.13.0, 2.12.2, 2.11.3, 2.10.3, and 2.6.7, an invalid DATA_FRAG Submessage causes a bad-free error, and the Fast-DDS process can be remotely terminated. If an invalid Data_Frag packet is sent, the Inline_qos, SerializedPayload member of object ch will attempt to release memory without initialization, resulting in a 'bad-free' error. Versions 2.13.0, 2.12.2, 2.11.3, 2.10.2, and 2.6.7 fix this issue.

CVSS Base Scores

version 3.1