Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 5 of 5 results


CVE-2024-48992

High priority
Fixed

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

1 affected packages

needrestart

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
needrestart Fixed Fixed Fixed Fixed Fixed
Show less packages

CVE-2024-48991

High priority
Fixed

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the...

1 affected packages

needrestart

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
needrestart Fixed Fixed Fixed Fixed Fixed
Show less packages

CVE-2024-48990

High priority
Fixed

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

1 affected packages

needrestart

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
needrestart Fixed Fixed Fixed Fixed Fixed
Show less packages

CVE-2024-11003

Medium priority
Fixed

Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see...

1 affected packages

needrestart

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
needrestart Fixed Fixed Fixed Fixed Fixed
Show less packages

CVE-2022-30688

Medium priority

Some fixes available 4 of 5

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to...

1 affected packages

needrestart

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
needrestart Not affected Fixed Fixed Fixed Needs evaluation
Show less packages