Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 30 Nov 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 26 Nov 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3). |
References |
|
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Needrestart Project
Needrestart Project needrestart |
|
CPEs | cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:* | |
Vendors & Products |
Needrestart Project
Needrestart Project needrestart |
|
Metrics |
ssvc
|
Tue, 19 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: canonical
Published: 2024-11-19T17:38:15.691Z
Updated: 2024-12-03T13:32:07.743Z
Reserved: 2024-10-11T16:13:54.153Z
Link: CVE-2024-48991
Vulnrichment
Updated: 2024-12-03T13:32:07.743Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T18:15:21.710
Modified: 2024-12-03T14:15:20.740
Link: CVE-2024-48991
Redhat
No data.