Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter).
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Needrestart Project
Needrestart Project needrestart |
|
CPEs | cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:* | |
Vendors & Products |
Needrestart Project
Needrestart Project needrestart |
|
Metrics |
ssvc
|
Tue, 19 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: canonical
Published: 2024-11-19T17:38:15.691Z
Updated: 2024-11-19T19:36:51.391Z
Reserved: 2024-10-11T16:13:54.153Z
Link: CVE-2024-48991
Vulnrichment
Updated: 2024-11-19T19:36:45.830Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T18:15:21.710
Modified: 2024-11-19T21:56:45.533
Link: CVE-2024-48991
Redhat
No data.