Lucene search

K
debianDebianDEBIAN:DSA-5568-1:14D57
HistoryNov 27, 2023 - 7:20 p.m.

[SECURITY] [DSA 5568-1] fastdds security update

2023-11-2719:20:37
lists.debian.org
17
vulnerability
memory management
version 2.9.1
debian
fastdds
fixed
security update

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

28.7%


Debian Security Advisory DSA-5568-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
November 27, 2023 https://www.debian.org/security/faq


Package : fastdds
CVE ID : CVE-2023-42459
Debian Bug : 1054163

It was discovered that incorrect memory management in Fast DDS, a C++
implementation of the DDS (Data Distribution Service) might result in
denial of service.

The oldstable distribution (bullseye) is not affected.

For the stable distribution (bookworm), this problem has been fixed in
version 2.9.1+ds-1+deb12u2.

We recommend that you upgrade your fastdds packages.

For the detailed security status of fastdds please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/fastdds

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

28.7%