|
Message-ID: <e53ec98ef43fa137db9a626e5148ae1c00ea7c7e.camel@fiasko-nw.net> Date: Tue, 17 May 2022 20:35:37 +0200 From: Thomas Liske <thomas@...sko-nw.net> To: oss-security@...ts.openwall.com Subject: CVE-2022-30688: needrestart 0.8+ local privilege escalation # needrestart: local privilege escalation https://github.com/liske/needrestart ## Description A local privilege escalation has been found in needrestart. CVE-2022- 30688 has been assigned to this issue. The interpreter heuristic contains unanchored regexs allowing local users to execute arbitrary code in the context of the user running needrestart. Needrestart might be run as root by package manager hooks on package installations or upgrades. ## Affected Affected: needrestart >= 0.8 Fixed in: needrestart >= 3.6 ## Mitigation Disabling the interpreter heuristic in neederstart's config prevents this attack: # Disable interpreter scanners. $nrconf{interpscan} = 0; ## Credit Reported by Jakub Wilk. Regards, Thomas Liske View attachment "anchor-interp-re.patch" of type "text/x-patch" (1244 bytes) Download attachment "signature.asc" of type "application/pgp-signature" (863 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.