We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-48991



Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).

Reserved 2024-10-11 | Published 2024-11-19 | Updated 2024-12-03 | Assigner canonical


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Any version before 3.8
affected

Credits

Qualys finder

Thomas Liske remediation developer

Mark Esler coordinator

Salvatore Bonaccorso remediation reviewer

Ivan Kurnosov remediation reviewer

References

www.cve.org/CVERecord?id=CVE-2024-48991 issue-tracking

github.com/...ommit/6ce6136cccc307c6b8a0f8cae12f9a22ac2aad59 patch

github.com/...ommit/42af5d328901287a4f79d1f5861ac827a53fd56d patch

www.qualys.com/2024/11/19/needrestart/needrestart.txt third-party-advisory

cve.org (CVE-2024-48991)

nvd.nist.gov (CVE-2024-48991)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-48991

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.