CVE-2024-48992

NameCVE-2024-48992
DescriptionQualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3957-1, DSA-5815-1, ELA-1238-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
needrestart (PTS)jessie, jessie (lts)1.2-8+deb8u4fixed
stretch (security)2.11-3+deb9u2vulnerable
stretch (lts), stretch2.11-3+deb9u4fixed
buster, buster (lts)3.4-5+deb10u3fixed
buster (security)3.4-5+deb10u1vulnerable
bullseye3.5-4+deb11u3vulnerable
bullseye (security)3.5-4+deb11u5fixed
bookworm3.6-4+deb12u1vulnerable
bookworm (security)3.6-4+deb12u3fixed
sid, trixie3.7-3.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
needrestartsourcejessie1.2-8+deb8u3ELA-1238-1
needrestartsourcestretch2.11-3+deb9u3ELA-1238-1
needrestartsourcebuster3.4-5+deb10u2ELA-1238-1
needrestartsourcebullseye3.5-4+deb11u4DLA-3957-1
needrestartsourcebookworm3.6-4+deb12u2DSA-5815-1
needrestartsource(unstable)3.7-3.1

Notes

https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
Fixed by; https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f (v3.8)

Search for package or bug name: Reporting problems