Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
History

Mon, 03 Nov 2025 23:30:00 +0000


Thu, 03 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:needrestart_project:needrestart:*:*:*:*:*:*:*:*

Thu, 13 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Tue, 03 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
References

Sat, 30 Nov 2024 13:30:00 +0000

Type Values Removed Values Added
References

Tue, 26 Nov 2024 20:30:00 +0000

Type Values Removed Values Added
Description Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).
References

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Needrestart Project
Needrestart Project needrestart
CPEs cpe:2.3:a:needrestart_project:needrestart:-:*:*:*:*:*:*:*
Vendors & Products Needrestart Project
Needrestart Project needrestart
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 Nov 2024 18:00:00 +0000

Type Values Removed Values Added
Description Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter).
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2024-11-19T17:38:15.691Z

Updated: 2025-11-03T22:22:10.925Z

Reserved: 2024-10-11T16:13:54.153Z

Link: CVE-2024-48991

cve-icon Vulnrichment

Updated: 2025-11-03T22:22:10.925Z

cve-icon NVD

Status : Modified

Published: 2024-11-19T18:15:21.710

Modified: 2025-11-03T23:16:24.593

Link: CVE-2024-48991

cve-icon Redhat

No data.