CVE-2022-30688

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:needrestart_project:needrestart:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-269 NVD-CWE-Other

Information

Published : 2022-05-17 19:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-30688

Mitre link : CVE-2022-30688

CVE.ORG link : CVE-2022-30688


JSON object : View

Products Affected

debian

  • debian_linux

needrestart_project

  • needrestart