Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 03 Jul 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:needrestart_project:needrestart:*:*:*:*:*:*:*:* |
Tue, 03 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 19 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Needrestart Project
Needrestart Project needrestart |
|
| Weaknesses | CWE-427 | |
| CPEs | cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Needrestart Project
Needrestart Project needrestart |
|
| Metrics |
ssvc
|
Tue, 19 Nov 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published: 2024-11-19T17:38:07.238Z
Updated: 2024-12-03T13:31:42.598Z
Reserved: 2024-10-11T16:13:54.153Z
Link: CVE-2024-48990
Updated: 2024-12-03T13:31:42.598Z
Status : Analyzed
Published: 2024-11-19T18:15:21.530
Modified: 2025-07-03T16:08:12.490
Link: CVE-2024-48990
No data.