Описание
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.6-8ubuntu6 |
| esm-apps/bionic | released | 3.1-1ubuntu0.1+esm1 |
| esm-apps/focal | released | 3.4-6ubuntu0.1+esm1 |
| esm-apps/xenial | released | 2.6-1ubuntu0.1~esm1 |
| focal | ignored | end of standard support, was needed |
| jammy | released | 3.5-5ubuntu2.2 |
| noble | released | 3.6-7ubuntu4.3 |
| oracular | released | 3.6-8ubuntu4.2 |
| plucky | released | 3.6-8ubuntu6 |
| upstream | needed |
Показывать по
EPSS
7.8 High
CVSS3
Связанные уязвимости
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
Qualys discovered that needrestart, before version 3.8, allows local a ...
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter).
Уязвимость утилиты needrestart, связанная с конкурентным доступом к ресурсу (состояние гонки), позволяющая нарушителю выполнить произвольный код в контексте root-пользователя
EPSS
7.8 High
CVSS3