Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2024-48992

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
0
Attacker Value
Unknown

CVE-2024-48991

Disclosure Date: November 19, 2024 (last updated November 26, 2024)
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
0
Attacker Value
Unknown

CVE-2024-48990

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
0
Attacker Value
Unknown

CVE-2024-11003

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.
0
Attacker Value
Unknown

CVE-2022-30688

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.