Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3957-1 | needrestart security update |
Debian DSA |
DSA-5815-1 | needrestart security update |
Ubuntu USN |
USN-7117-1 | needrestart and Module::ScanDeps vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Edit /etc/needrestart/needrestart.conf so that the following line appears after "# Disable interpreter scanners." and reboot: $nrconf{interpscan} = 0;
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 03 Jul 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:needrestart_project:needrestart:*:*:*:*:*:*:*:* |
Tue, 03 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 19 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Needrestart Project
Needrestart Project needrestart |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Needrestart Project
Needrestart Project needrestart |
|
| Metrics |
ssvc
|
Tue, 19 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-11-03T21:51:44.254Z
Reserved: 2024-11-07T21:16:46.553Z
Link: CVE-2024-11003
Updated: 2025-11-03T21:51:44.254Z
Status : Modified
Published: 2024-11-19T18:15:19.973
Modified: 2025-11-03T22:16:37.127
Link: CVE-2024-11003
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN