CVE-2024-48991

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
Configurations

No configuration.

History

13 Mar 2025, 16:15

Type Values Removed Values Added
CWE CWE-362

03 Dec 2024, 14:15

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2024/11/19/1 -

30 Nov 2024, 13:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/11/30/4 -

26 Nov 2024, 21:15

Type Values Removed Values Added
References
  • () https://github.com/liske/needrestart/commit/42af5d328901287a4f79d1f5861ac827a53fd56d -
Summary
  • (es) Qualys descubrió que needrestart, antes de la versión 3.8, permite a atacantes locales ejecutar código arbitrario como superusuario ganando una condición de ejecución y engañando a needrestart para que ejecute su propio intérprete de Python falso (en lugar del intérprete de Python real del sistema).
Summary (en) Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). (en) Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).

19 Nov 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-19 18:15

Updated : 2025-03-13 16:15


NVD link : CVE-2024-48991

Mitre link : CVE-2024-48991

CVE.ORG link : CVE-2024-48991


JSON object : View

Products Affected

No product.

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')