Security bugs found in Linux’s needrestart tool after 10 years

  • Linux’s needrestart tool has been found to have security flaws since 2014, allowing local attackers to gain root access without user interaction.
  • Five vulnerabilities affecting Python, Ruby, and Perl interpreters make these flaws highly dangerous and easily exploitable.

What happened

Linux‘s needrestart tool has been found to contain security flaws that went undetected for a decade. These vulnerabilities allow unprivileged local attackers to gain root access without user interaction, making them highly dangerous. Researchers at Qualys have refused to release exploit code but describe the flaws as “alarming” and “easily exploitable,” urging admins to apply fixes immediately.

The needrestart tool, which determines if a system restart is required after updates, is included in many Linux distributions, notably Ubuntu Server. The flaws are present in versions before 3.8, introduced back in 2014.

Five vulnerabilities (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, CVE-2024-11003) involve issues with Python, Ruby, and Perl interpreters, allowing attackers to execute code as root.

Administrators should update needrestart to version 3.8 or later or modify configurations to mitigate these issues.

Also read: Web vulnerabilities: Risks to data and reputation

Also read: Can encrypted data be compromised? Revealing hidden vulnerabilities

Why it is important

The discovery of security flaws in Linux’s needrestart tool is critical because it impacts numerous systems globally. These vulnerabilities let unprivileged attackers gain root access without user involvement. This level of access gives them full control, putting sensitive data and system stability at risk. Many popular Linux distributions, such as Ubuntu Server, include needrestart, making this a widespread issue. With flaws dating back to 2014, many systems remain vulnerable. The risks are severe, as attackers could exploit weaknesses in Python, Ruby, and Perl interpreters to run malicious code. Researchers call these flaws “alarming” and easily exploitable, highlighting the urgency of the situation. Immediate action—either updating needrestart to version 3.8 or changing configurations—is crucial to protect systems from potential threats. By patching these vulnerabilities, administrators can help safeguard the integrity and security of their Linux environments.

Tanee-Shao

Tanee Shao

Tanee Shao is an intern reporter at BTW Media, having studied at Kings College of London. She specialises in fintech. Contact her at t.shao@btw.media.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *