CVE-2024-48992

HIGH

Needrestart < 3.8 - Uncontrolled Search Path

Title source: rule

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

Scores

CVSS v3 7.8
EPSS 0.0138
EPSS Percentile 80.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-427
Status published

Affected Products (1)

needrestart_project/needrestart < 3.8

Timeline

Published Nov 19, 2024
Tracked Since Feb 18, 2026