Source: fastdds
Version: 3.1.0+ds-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/eProsima/Fast-DDS/pull/5530
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for fastdds.

CVE-2025-24807[0]:
| eprosima Fast DDS is a C++ implementation of the DDS (Data
| Distribution Service) standard of the OMG (Object Management Group).
| Prior to versions 2.6.10, 2.10.7, 2.14.5, 3.0.2, 3.1.2, and 3.2.0,
| per design, PermissionsCA is not full chain validated, nor is the
| expiration date validated. Access control plugin validates only the
| S/MIME signature which causes an expired PermissionsCA to be taken
| as valid. Even though this issue is responsible for allowing
| `governance/permissions` from an expired PermissionsCA and having
| the system crash when PermissionsCA is not self-signed and contains
| the full-chain, the impact is low. Versions 2.6.10, 2.10.7, 2.14.5,
| 3.0.2, 3.1.2, and 3.2.0 contain a fix for the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-24807
    https://www.cve.org/CVERecord?id=CVE-2025-24807
[1] https://github.com/eProsima/Fast-DDS/pull/5530
[2] https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-w33g-jmm2-8983

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to