Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-39289

Опубликовано: 17 июл. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 7.8

Описание

A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code.

РелизСтатусПримечание
ros-esm/xenial

released

1.12.17+8
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/bionic

released

1.14.13+4
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/focal/noetic

released

1.17.4+2
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
7 месяцев назад

A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
debian
7 месяцев назад

A code execution vulnerability has been discovered in the Robot Operat ...

CVSS3: 7.8
github
7 месяцев назад

A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code.

7.8 High

CVSS3