7.8
CVSSv3

CVE-2022-30688

Published: 17/05/2022 Updated: 08/08/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

needrestart 0.8 up to and including 3.5 prior to 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

needrestart project needrestart

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1011154 needrestart: Security fix in new release (36) Package: needrestart; Maintainer for needrestart is Patrick Matthäi <pmatthaei@debianorg>; Source for needrestart is src:needrestart (PTS, buildd, popcon) Reported by: Amin Vakil <info@aminvakilcom> Date: Tue, 17 May 2022 15:48:01 UTC ...
Jakub Wilk discovered a local privilege escalation in needrestart, a utility to check which daemons need to be restarted after library upgrades Regular expressions to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source fi ...