{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-48990","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2024-10-11T16:13:54.153Z","datePublished":"2024-11-19T17:38:07.238Z","dateUpdated":"2025-11-03T22:22:08.006Z"},"containers":{"cna":{"affected":[{"packageName":"needrestart","product":"needrestart","vendor":"needrestart","repo":"https://github.com/liske/needrestart","platforms":["Linux"],"versions":[{"lessThan":"3.8","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable."}],"workarounds":[{"lang":"en","value":"Edit /etc/needrestart/needrestart.conf so that the following line\nappears after \"# Disable interpreter scanners.\" and reboot:\n$nrconf{interpscan} = 0;"}],"references":[{"tags":["issue-tracking"],"url":"https://www.cve.org/CVERecord?id=CVE-2024-48990"},{"tags":["patch"],"url":"https://github.com/liske/needrestart/commit/fcc9a4401392231bef4ef5ed026a0d7a275149ab"},{"tags":["third-party-advisory"],"url":"https://www.qualys.com/2024/11/19/needrestart/needrestart.txt"}],"credits":[{"lang":"en","type":"finder","value":"Qualys"},{"lang":"en","type":"remediation developer","value":"Thomas Liske"},{"lang":"en","type":"coordinator","value":"Mark Esler"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH"}}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2024-11-19T17:38:07.238Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-427","lang":"en","description":"CWE-427 Uncontrolled Search Path Element"}]}],"affected":[{"vendor":"needrestart_project","product":"needrestart","cpes":["cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.8","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-19T19:47:39.271392Z","id":"CVE-2024-48990","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-19T19:49:07.357Z"}},{"title":"CVE Program Container","references":[{"url":"https://www.openwall.com/lists/oss-security/2024/11/19/1"},{"url":"http://seclists.org/fulldisclosure/2024/Nov/17"},{"url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00014.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:22:08.006Z"}}]}}