UBUNTU-CVE-2024-30259

Source
https://ubuntu.com/security/CVE-2024-30259
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-30259.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-30259
Related
Published
2024-05-14T15:22:00Z
Modified
2024-10-23T04:40:29Z
Summary
[none]
Details

FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed RTPS packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.

References

Affected packages

Ubuntu:22.04:LTS / fastdds

Package

Name
fastdds
Purl
pkg:deb/ubuntu/fastdds?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1.0+ds-9
2.4.1+ds-1
2.5.0+ds-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / fastdds

Package

Name
fastdds
Purl
pkg:deb/ubuntu/fastdds?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.11.2+ds-6.1build3
2.14.1+ds-1
2.14.1+ds-1build1
2.14.2+ds-1
2.14.3+ds-1

3.*

3.0.0+ds-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / fastdds

Package

Name
fastdds
Purl
pkg:deb/ubuntu/fastdds?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.10.1+ds-3
2.11.2+ds-6
2.11.2+ds-6ubuntu1
2.11.2+ds-6.1build2
2.11.2+ds-6.1build3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}