CVE-2022-30688Improper Privilege Management in Project Needrestart

Severity
7.8HIGHNVD
EPSS
0.1%
top 84.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateMay 18

Description

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/needrestart< needrestart 3.6-1 (bookworm)
Debianneedrestart/needrestart< 3.5-4+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6qgc-vw4g-mxw4: needrestart 02022-05-18
OSV
CVE-2022-30688: needrestart 02022-05-17

📋Vendor Advisories

2
Ubuntu
needrestart vulnerability2022-05-17
Debian
CVE-2022-30688: needrestart - needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. R...2022
CVE-2022-30688 — Improper Privilege Management | cvebase