Needrestart Project

Needrestart

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 19.39%
  • Veröffentlicht 19.11.2024 18:15:21
  • Zuletzt bearbeitet 03.11.2025 23:16:24

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

  • EPSS 0.25%
  • Veröffentlicht 19.11.2024 18:15:21
  • Zuletzt bearbeitet 03.11.2025 23:16:24

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python...

  • EPSS 1.1%
  • Veröffentlicht 19.11.2024 18:15:21
  • Zuletzt bearbeitet 03.11.2025 23:16:24

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

  • EPSS 21.16%
  • Veröffentlicht 19.11.2024 18:15:19
  • Zuletzt bearbeitet 03.11.2025 22:16:37

Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in...

  • EPSS 0.05%
  • Veröffentlicht 17.05.2022 19:15:08
  • Zuletzt bearbeitet 03.11.2025 22:15:58

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters a...