Urgent Patch Alert: Five Critical Privilege Escalation Flaws Found in Ubuntu's Needrestart Utility

November 21, 2024
Urgent Patch Alert: Five Critical Privilege Escalation Flaws Found in Ubuntu's Needrestart Utility
  • These vulnerabilities, disclosed by Saeed Abbasi on November 19, 2024, were introduced in needrestart version 0.8, released in April 2014, highlighting a long-standing security issue.

  • The vulnerabilities have been assigned identifiers CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003, with CVSSv3 scores ranging from 5.3 to 7.8, indicating their severity.

  • Exploitation of these flaws could lead to unauthorized access to sensitive data, malware installation, and operational disruptions, posing significant risks for enterprises.

  • Qualys's Threat Research Unit has developed functional exploits for these vulnerabilities but has opted not to release them, citing the alarming nature of the findings.

  • Ubuntu has addressed these vulnerabilities in needrestart version 3.8, which scans systems to determine which services need to be restarted after shared library updates.

  • A patch for these vulnerabilities is now available, and users are strongly urged to apply it to secure their systems.

  • Immediate mitigation is recommended through software updates or by disabling vulnerable features in the configuration file located at /etc/needrestart/needrestart.conf.

  • Past incidents have shown that attackers have exploited similar Linux privilege escalation flaws, emphasizing the need for vigilance and prompt action.

  • Exploitation requires local access, which somewhat mitigates the risk, but similar vulnerabilities have been exploited in the past, underscoring the importance of caution.

  • Researchers at Qualys have identified five vulnerabilities in the needrestart utility, which could allow unprivileged local attackers to escalate privileges to root on Ubuntu systems.

  • Canonical, the maintainer of Ubuntu, has released updated packages for affected releases and recommends immediate application of the fixes.

  • For users unable to apply immediate updates, temporary mitigation includes modifying the needrestart configuration to disable interpreter scanning, though this may affect other updates.

Summary based on 9 sources


Get a daily email with more Tech stories

More Stories