Headline
Ubuntu Security Notice USN-5426-1
Ubuntu Security Notice 5426-1 - Jakub Wilk discovered that needrestart incorrectly used some regular expressions. A local attacker could possibly use this issue to execute arbitrary code.
==========================================================================
Ubuntu Security Notice USN-5426-1
May 17, 2022
needrestart vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
needrestart could be made to run programs.
Software Description:
- needrestart: check which daemons need to be restarted after library upgrades
Details:
Jakub Wilk discovered that needrestart incorrectly used some regular
expressions. A local attacker could possibly use this issue to execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
needrestart 3.5-5ubuntu2.1
Ubuntu 21.10:
needrestart 3.5-4ubuntu2.1
Ubuntu 20.04 LTS:
needrestart 3.4-6ubuntu0.1
Ubuntu 18.04 LTS:
needrestart 3.1-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5426-1
CVE-2022-30688
Package Information:
https://launchpad.net/ubuntu/+source/needrestart/3.5-5ubuntu2.1
https://launchpad.net/ubuntu/+source/needrestart/3.5-4ubuntu2.1
https://launchpad.net/ubuntu/+source/needrestart/3.4-6ubuntu0.1
https://launchpad.net/ubuntu/+source/needrestart/3.1-1ubuntu0.1
Related news
Qualys discovered that needrestart suffers from multiple local privilege escalation vulnerabilities that allow for root access from an unprivileged user.
needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.