The Qualys Threat Research Unit (TRU) has recently revealed the discovery of five significant Local Privilege Escalation (LPE) vulnerabilities within the needrestart component of Ubuntu Servers, marked by CVE identifiers CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003. These vulnerabilities pose a severe risk by potentially allowing unprivileged users to escalate to root access during routine software installations or updates.
Needrestart, a utility that operates automatically following APT operations like installations, upgrades, or removals on Ubuntu systems, is designed to ensure that services restart when necessary. This process is crucial for applying updates from newly installed libraries, thereby maintaining system security and performance without the need for a complete system reboot.
The vulnerabilities, present since the release of needrestart version 0.8 in April 2014, could allow unauthorized data access, malware propagation, and significant operational disruptions. These potential breaches and disruptions could lead to compromised data security, regulatory non-compliance, and a reduction in customer and stakeholder trust, negatively impacting an organization’s reputation.
TRU reports that these flaws affect needrestart versions installed by default on Ubuntu Servers starting from version 21.04. The vulnerabilities permit the execution of arbitrary code with root privileges through manipulated environment variables targeting the Python/Ruby interpreter.
To mitigate these risks, organizations are advised to either update their needrestart software to the latest version or disable the interpreter scanning feature. This can be accomplished by setting “$nrconf{interpscan} = 0;” in the /etc/needrestart/needrestart.conf file, effectively preventing the exploitation of this vulnerability.
While Qualys TRU has created functional exploits for these vulnerabilities, they have opted not to disclose them publicly to prevent abuse. However, they have issued a warning about the ease of exploiting these vulnerabilities, suggesting that detailed exploits might soon become publicly available following their responsible disclosure.
Qualys emphasizes the urgency of updating the needrestart software to version 3.8, where these vulnerabilities have been addressed, to maintain the integrity of systems relying on this utility. Further technical details and remediation strategies are available on the Qualys blog and in their detailed technical documentation.
Subtly charming pop culture geek. Amateur analyst. Freelance tv buff. Coffee lover