ELA-1238-1 needrestart security update

multiple vulnerabilities

2024-11-20
Packageneedrestart
Version1.2-8+deb8u3 (jessie), 2.11-3+deb9u3 (stretch), 3.4-5+deb10u2 (buster)
Related CVEs CVE-2024-11003 CVE-2024-48990 CVE-2024-48991 CVE-2024-48992


The Qualys Threat Research Unit discovered several local privilege escalation vulnerabilities in needrestart, a utility to check which daemons need to be restarted after library upgrades.

CVE-2024-11003

  Local attackers can trick needrestart to call the Perl module
  Module::ScanDeps with attacker-controlled files.

CVE-2024-48990

  Local attackers can execute arbitrary code as root by tricking needrestart
  into running the Python interpreter with an attacker-controlled PYTHONPATH
  environment variable.

CVE-2024-28991

  Local attackers can execute arbitrary code as root by winning a race
  condition and tricking needrestart into running their own, fake Python
  interpreter (instead of the system's real Python interpreter).

CVE-2024-28992

  Local attackers can also execute arbitrary code as root by tricking
  needrestart into running the Ruby interpreter with an attacker-controlled
  RUBYLIB environment variable.

Details can be found in the Qualys advisory at https://www.qualys.com/2024/11/19/needrestart/needrestart.txt



For Debian 10 buster, these problems have been fixed in version 3.4-5+deb10u2.

For Debian 8 jessie, these problems have been fixed in version 1.2-8+deb8u3.

For Debian 9 stretch, these problems have been fixed in version 2.11-3+deb9u3.

We recommend that you upgrade your needrestart packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.