CVE-2024-48992

HIGH

Needrestart < 3.8 - Uncontrolled Search Path

Title source: rule
STIX 2.1

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

Scores

CVSS v3 7.8
EPSS 0.0078
EPSS Percentile 73.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-427
Status published
Products (1)
needrestart_project/needrestart < 3.8
Published Nov 19, 2024
Tracked Since Feb 18, 2026