CVE-2024-48992: Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into...

7.8 CVSS

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.

Classification

CVE ID: CVE-2024-48992

CVSS Base Severity: HIGH

CVSS Base Score: 7.8

Affected Products

Vendor: needrestart

Product: needrestart

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 17.81% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://www.cve.org/CVERecord?id=CVE-2024-48992
https://github.com/liske/needrestart/commit/b5f25f6ec6e7dd0c5be249e4e45de4ee9ffe594f
https://www.qualys.com/2024/11/19/needrestart/needrestart.txt

Timeline