Описание
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.6-8ubuntu6 |
| esm-apps/bionic | released | 3.1-1ubuntu0.1+esm1 |
| esm-apps/focal | released | 3.4-6ubuntu0.1+esm1 |
| esm-apps/xenial | released | 2.6-1ubuntu0.1~esm1 |
| focal | ignored | end of standard support, was needed |
| jammy | released | 3.5-5ubuntu2.2 |
| noble | released | 3.6-7ubuntu4.3 |
| oracular | released | 3.6-8ubuntu4.2 |
| plucky | released | 3.6-8ubuntu6 |
| upstream | needed |
Показывать по
EPSS
7.8 High
CVSS3
Связанные уязвимости
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
Qualys discovered that needrestart, before version 3.8, allows local a ...
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
Уязвимость утилиты needrestart, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю выполнить произвольный код в контексте root-пользователя
EPSS
7.8 High
CVSS3