Source: fastdds Version: 3.1.0+ds-2 Severity: important Tags: security upstream Forwarded: https://github.com/eProsima/Fast-DDS/pull/5530 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for fastdds. CVE-2025-24807[0]: | eprosima Fast DDS is a C++ implementation of the DDS (Data | Distribution Service) standard of the OMG (Object Management Group). | Prior to versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0, | per design, PermissionsCA is not full chain validated, nor is the | expiration date validated. Access control plugin validates only the | S/MIME signature which causes an expired PermissionsCA to be taken | as valid. Even though this issue is responsible for allowing | `governance/permissions` from an expired PermissionsCA and having | the system crash when PermissionsCA is not self-signed and contains | the full-chain, the impact is low. Versions 2.6.10, 2.10.7, 2.14.5, | 3.0.2, 3.1.2, and 3.2.0 contain a fix for the issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-24807 https://www.cve.org/CVERecord?id=CVE-2025-24807 [1] https://github.com/eProsima/Fast-DDS/pull/5530 [2] https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-w33g-jmm2-8983 Please adjust the affected versions in the BTS as needed. Regards, Salvatore