CVE-2024-11003

NameCVE-2024-11003
DescriptionQualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3957-1, DSA-5815-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
needrestart (PTS)bullseye3.5-4+deb11u3vulnerable
bullseye (security)3.5-4+deb11u4fixed
bookworm3.6-4+deb12u1vulnerable
bookworm (security)3.6-4+deb12u2fixed
trixie3.7-3vulnerable
sid3.7-3.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
needrestartsourcebullseye3.5-4+deb11u4DLA-3957-1
needrestartsourcebookworm3.6-4+deb12u2DSA-5815-1
needrestartsource(unstable)3.7-3.1

Notes

https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
Fixed by: https://github.com/liske/needrestart/commit/0f80a348883f72279a859ee655f58da34babefb0 (v3.8)

Search for package or bug name: Reporting problems