Lucene search

K
Needrestart ProjectNeedrestart

5 matches found

CVE
CVE
added 2022/05/17 7:15 p.m.144 views

CVE-2022-30688

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.

7.8CVSS7.5AI score0.00044EPSS
CVE
CVE
added 2024/11/19 6:15 p.m.100 views

CVE-2024-48990

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

7.8CVSS7.9AI score0.14586EPSS
CVE
CVE
added 2024/11/19 6:15 p.m.81 views

CVE-2024-11003

Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.

7.8CVSS5.9AI score0.11376EPSS
CVE
CVE
added 2024/11/19 6:15 p.m.52 views

CVE-2024-48991

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136)...

7.8CVSS7.7AI score0.00073EPSS
CVE
CVE
added 2024/11/19 6:15 p.m.52 views

CVE-2024-48992

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

7.8CVSS7.9AI score0.00151EPSS