CVE-2022-30688

HIGH

needrestart <3.6 - Privilege Escalation

Title source: llm
STIX 2.1

Description

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.

References (9)

Core 9
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/liske/needrestart/releases/tag/v3.6
Mailing List, Third Party Advisory x_refsource_misc
https://lists.debian.org/debian-security-announce/2022/msg00105.html
Mailing List, Third Party Advisory x_refsource_misc
https://www.openwall.com/lists/oss-security/2022/05/17/9
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2022/05/17/9
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2022/dsa-5137
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/05/msg00024.html

Scores

CVSS v3 7.8
EPSS 0.0005
EPSS Percentile 16.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (4)
debian/debian_linux 9.0
debian/debian_linux 10.0
debian/debian_linux 11.0
needrestart_project/needrestart 0.8 - 3.6
Published May 17, 2022
Tracked Since Feb 18, 2026