CVE-2024-30699

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

27 May 2024, 01:15

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad de desbordamiento de búfer en los componentes C++ de ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar código arbitrario o provocar una denegación de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas. NOTA: esto es cuestionado por varios terceros que creen que no había pruebas razonables para determinar la existencia de una vulnerabilidad.
Summary (en) A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/2', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/3', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/4', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/5', 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/yashpatelphd/CVE-2024-30699', 'source': 'cve@mitre.org'}

01 May 2024, 19:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/5 -

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/3 -

01 May 2024, 17:15

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad de desbordamiento de búfer en los componentes C++ de ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar código arbitrario o provocar una denegación de servicio (DoS) mediante un manejo inadecuado de matrices o cadenas. NOTA: esto es cuestionado por varios terceros que creen que no había pruebas razonables para determinar la existencia de una vulnerabilidad.
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/2 -
  • () http://www.openwall.com/lists/oss-security/2024/04/23/4 -

17 Apr 2024, 01:15

Type Values Removed Values Added
Summary (en) A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. (en) A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability.

09 Apr 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-09 08:15

Updated : 2024-05-27 01:15


NVD link : CVE-2024-30699

Mitre link : CVE-2024-30699

CVE.ORG link : CVE-2024-30699


JSON object : View

Products Affected

No product.

CWE

No CWE.