Jahrzehnte alter Fehler bei der lokalen Rechteerweiterung beeinträchtigt Ubuntu-Paket needrestart

Teilen:

Decade-old flaws in the needrestart package in Ubuntu Server could allow local attackers to gain root privileges without user interaction.

The Qualys Threat Research Unit (TRU) discovered five Local Privilege Escalation (LPE) decade-old security vulnerabilities in the needrestart package that could allow a local attacker to gain root privileges without requiring user interaction.

The needrestart package in Ubuntu is a utility designed to ensure system stability after software updates. When packages are updated, especially ones affecting shared libraries or services, it’s often necessary to restart those services or even the entire system for changes to take effect.

The needrestart package is installed by default in Ubuntu Server, starting with version 21.04. The flaws were likely introduced with the interpreter support in needrestart version 0.8, released in April 2014.

The vulnerabilities have been tracked as CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003.

These are the descriptions for the flaws:

  • CVE-2024-48990 (CVSS score: 7.8) – A vulnerability that allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
  • CVE-2024-48991 (CVSS score: 7.8) – A vulnerability that allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system’s real Python interpreter).
  • CVE-2024-48992 (CVSS score: 7.8) – A vulnerability that allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.
  • CVE-2024-11003 (CVSS score: 7.8) and CVE-2024-10224 (CVSS score: 5.3) – These vulnerabilities allows a local attacker to execute arbitrary shell commands.

The Qualys TRU team has developed functional exploits for disclosed vulnerabilities, warning that they are easily exploitable and may soon see public working exploits.

“These vulnerabilities in the needrestart utility allow local users to escalate their privileges by executing arbitrary code during package installations or upgrades, where needrestart is often run as the root user.” reads the advisory. “An attacker exploiting these vulnerabilities could gain root access, compromising system integrity and security.”

Successful exploitation of these flaws could expose enterprises to severe risks like unauthorized data access, malware, and operational disruptions, leading to breaches, non-compliance, and reputational harm. Immediate mitigation through software updates or disabling the vulnerability is essential.

To prevent the exploitation of the flaw Qualys researchers recommend disabling the interpreter scanning feature in needrestart by modifying its configuration file, typically located at /etc/needrestart/needrestart.conf. Add the line $nrconf{interpscan} = 0; to disable interpreter scanners and block the vulnerability.

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
12:30 am, März 27, 2025
Wetter-Symbol 8°C
L: 6° | H: 9°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 82 %
Druck: 1024 mb
Wind: 5 mph W
Windböe: 9 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 37%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:46 am
Sonnenuntergang: 6:24 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
6° | 9°°C 0 mm 0% 9 mph 90 % 1024 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
7° | 12°°C 1 mm 100% 13 mph 93 % 1015 mb 0 mm/h
Sa. März 29 9:00 pm
Wetter-Symbol
4° | 12°°C 0 mm 0% 9 mph 78 % 1023 mb 0 mm/h
So. März 30 9:00 pm
Wetter-Symbol
7° | 17°°C 0 mm 0% 10 mph 82 % 1024 mb 0 mm/h
Mo. März 31 9:00 pm
Wetter-Symbol
8° | 15°°C 0 mm 0% 8 mph 86 % 1028 mb 0 mm/h
Today 3:00 am
Wetter-Symbol
8° | 9°°C 0 mm 0% 4 mph 86 % 1024 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
8° | 8°°C 0 mm 0% 4 mph 90 % 1023 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 69 % 1023 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 7 mph 51 % 1021 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 9 mph 47 % 1018 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 7 mph 60 % 1017 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
12° | 12°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 7 mph 82 % 1015 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€80,865.38
-0.87%
Ethereum(ETH)
€1,870.64
-2.91%
Fesseln(USDT)
€0.93
-0.01%
XRP(XRP)
€2.19
-4.19%
Solana(SOL)
€127.61
-4.62%
USDC(USDC)
€0.93
0.00%
Dogecoin(DOGE)
€0.180391
1.11%
Shiba Inu(SHIB)
€0.000013
1.35%
Pepe(PEPE)
€0.000007
5.81%
Peanut das Eichhörnchen(PNUT)
€0.214428
7.85%
Nach oben scrollen