Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-39835

Опубликовано: 17 июл. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

РелизСтатусПримечание
ros-esm/xenial

released

1.12.17+7
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/bionic

released

1.14.13+3
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/focal/noetic

released

1.17.4+2
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

EPSS

Процентиль: 4%
0.00018
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
7 месяцев назад

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
debian
7 месяцев назад

A code injection vulnerability has been identified in the Robot Operat ...

CVSS3: 7.8
github
7 месяцев назад

A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.

EPSS

Процентиль: 4%
0.00018
Низкий

7.8 High

CVSS3