Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-39780

Опубликовано: 02 апр. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 7.8

Описание

A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

РелизСтатусПримечание
ros-esm/xenial

released

1.5.50+3
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/bionic

released

1.6.5+3
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/focal/noetic

released

1.7.6+2
upstream

ignored

end of life

Показывать по

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
10 месяцев назад

A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.

CVSS3: 7.8
debian
10 месяцев назад

A YAML deserialization vulnerability was found in the Robot Operating ...

CVSS3: 8.4
github
10 месяцев назад

A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code. This issue has now been fixed for ROS Noetic via commit 3d93ac13603438323d7e9fa74e879e45c5fe2e8e.

7.8 High

CVSS3