CVE-2024-48991
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
19/11/2024
Last modified:
03/07/2025
Description
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:needrestart_project:needrestart:*:*:*:*:*:*:*:* | 3.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/liske/needrestart/commit/42af5d328901287a4f79d1f5861ac827a53fd56d
- https://github.com/liske/needrestart/commit/6ce6136cccc307c6b8a0f8cae12f9a22ac2aad59
- https://www.cve.org/CVERecord?id=CVE-2024-48991
- https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
- http://www.openwall.com/lists/oss-security/2024/11/30/4
- https://www.openwall.com/lists/oss-security/2024/11/19/1