CVE-2024-48992
HIGHNeedrestart < 3.8 - Uncontrolled Search Path
Title source: ruleDescription
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
Scores
CVSS v3
7.8
EPSS
0.0138
EPSS Percentile
80.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-427
Status
published
Affected Products (1)
needrestart_project/needrestart
< 3.8
Timeline
Published
Nov 19, 2024
Tracked Since
Feb 18, 2026