Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Needrestart Project
Needrestart Project needrestart |
|
Weaknesses | CWE-427 | |
CPEs | cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:* | |
Vendors & Products |
Needrestart Project
Needrestart Project needrestart |
|
Metrics |
ssvc
|
Tue, 19 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable. | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: canonical
Published: 2024-11-19T17:38:22.267Z
Updated: 2024-11-19T19:32:49.865Z
Reserved: 2024-10-11T16:13:54.153Z
Link: CVE-2024-48992
Vulnrichment
Updated: 2024-11-19T19:32:05.395Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T18:15:21.897
Modified: 2024-11-19T21:56:45.533
Link: CVE-2024-48992
Redhat
No data.