Source: fastdds
Version: 3.1.2+ds-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi Timo,

The following vulnerability was published for fastdds. But I'm not
really sure on the state of it, if upstream intends or has acted on
it, there is one reference associated with various DDS implementations
which each got a own CVE, CVE-2023-24010 for fastdds.

CVE-2023-24010[0]:
| An attacker can arbitrarily craft malicious DDS Participants (or ROS
| 2 Nodes) with valid certificates to compromise and get full control
| of the attacked secure DDS databus system by exploiting vulnerable
| attributes in the configuration of PKCS#7 certificate’s validation.
| This is caused by a non-compliant implementation of permission
| document verification used by some DDS vendors. Specifically, an
| improper use of the OpenSSL PKCS7_verify function used to validate
| S/MIME signatures.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-24010
    https://www.cve.org/CVERecord?id=CVE-2023-24010
[1] https://github.com/ros2/sros2/issues/282

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to