Description
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
References (8)
Core 8
Core References
Mailing List
http://seclists.org/fulldisclosure/2024/Nov/17
VDB Entry issue-tracking
https://www.cve.org/CVERecord?id=CVE-2024-48991
Third Party Advisory third-party-advisory
https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
Scores
CVSS v3
7.8
EPSS
0.0023
EPSS Percentile
45.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-362
Status
published
Products (1)
needrestart_project/needrestart
< 3.8
Published
Nov 19, 2024
Tracked Since
Feb 18, 2026