CVE-2024-48992Uncontrolled Search Path Element in Needrestart

Severity
7.8HIGHNVD
EPSS
1.0%
top 22.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 19
Latest updateDec 5

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/needrestart< needrestart 3.6-4+deb12u2 (bookworm)
CVEListV5needrestart/needrestart< 3.8
Debianneedrestart/needrestart< 3.5-4+deb11u4+3
Ubuntuneedrestart/needrestart< 3.5-5ubuntu2.3+14

Patches

🔴Vulnerability Details

5
OSV
needrestart regression2024-12-05
OSV
needrestart regression2024-11-26
GHSA
GHSA-xmgx-2283-p55h: Qualys discovered that needrestart, before version 32024-11-19
OSV
Several security issues were fixed in needrestart and Module::ScanDeps2024-11-19
OSV
CVE-2024-48992: Qualys discovered that needrestart, before version 32024-11-19

📋Vendor Advisories

4
Ubuntu
needrestart regression2024-12-05
Ubuntu
needrestart regression2024-11-26
Ubuntu
needrestart and Module::ScanDeps vulnerabilities2024-11-19
Debian
CVE-2024-48992: needrestart - Qualys discovered that needrestart, before version 3.8, allows local attackers t...2024

🕵️Threat Intelligence

5
Qualys
Mitigate High-Risk Vulnerabilities Using TruRisk | Qualys2024-12-04
Qualys
Proactively Managing High-Risk Vulnerabilities with TruRisk Mitigate™2024-12-04
Bleepingcomputer
Ubuntu Linux impacted by decade-old &#039;needrestart&#039; flaw that gives root2024-11-20
Qualys
Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart2024-11-19
Qualys
Qualys TRU Uncovers 5 Local Privilege Escalation Flaws | Qualys2024-11-19
CVE-2024-48992 — Uncontrolled Search Path Element | cvebase