CVE-2024-48991
Ubuntu Security Notice USN-7117-3
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter).
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
The Qualys Threat Research Unit discovered several local privilege escalation vulnerabilities in needrestart, a utility to check which daemons need to be restarted after library upgrades. A local attacker can execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable (CVE-2024-48990) or running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable (CVE-2024-48992). Additionally a local attacker can trick needrestart into running a fake Python interpreter (CVE-2024-48991) or cause needrestart to call the Perl module Module::ScanDeps with attacker-controlled files (CVE-2024-11003).
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-10-11 CVE Reserved
- 2024-11-19 CVE Published
- 2024-11-22 First Exploit
- 2025-03-13 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://www.cve.org/CVERecord?id=CVE-2024-48991 | Issue Tracking | |
https://www.qualys.com/2024/11/19/needrestart/needrestart.txt | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/182765 | 2024-11-22 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Needrestart Search vendor "Needrestart" | Needrestart Search vendor "Needrestart" for product "Needrestart" | < 3.8 Search vendor "Needrestart" for product "Needrestart" and version " < 3.8" | en |
Affected
|