Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-48990

Опубликовано: 19 нояб. 2024
Источник: debian
EPSS Средний

Описание

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
needrestartfixed3.7-3.1package

Примечания

  • https://www.qualys.com/2024/11/19/needrestart/needrestart.txt

  • Fixed by: https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab (v3.8)

EPSS

Процентиль: 95%
0.19394
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

CVSS3: 7.8
nvd
около 1 года назад

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

CVSS3: 7.8
github
около 1 года назад

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

CVSS3: 7.8
fstec
около 1 года назад

Уязвимость утилиты needrestart, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю выполнить произвольный код в контексте root-пользователя

EPSS

Процентиль: 95%
0.19394
Средний