[SECURITY] Fedora 40 Update: needrestart-3.8-1.fc40

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-d2124788a8
2024-11-25 03:53:12.316733+00:00
--------------------------------------------------------------------------------

Name        : needrestart
Product     : Fedora 40
Version     : 3.8
Release     : 1.fc40
URL         : https://github.com/liske/needrestart
Summary     : Restart daemons after library updates
Description :
needrestart checks which daemons need to be restarted after library
upgrades. It is inspired by checkrestart from the debian-goodies
package.

--------------------------------------------------------------------------------
Update Information:

Rebase to fix CVEs
--------------------------------------------------------------------------------
ChangeLog:

* Sun Nov 24 2024 Steve Cossette <farchord@xxxxxxxxx> - 3.8-1
- Update to 3.8 to fix several CVEs:
- CVE-2024-48991: Prevent race condition on /proc/$PID/exec evaluation
- CVE-2024-11003: Drop usage of Module::ScanDeps to prevent LPE.
- CVE-2024-48990: Do not set PYTHONPATH environment variable to prevent a LPE.
- CVE-2024-48992: Do not set RUBYLIB environment variable to prevent a LPE.
* Fri Jul 26 2024 Miroslav Suchý <msuchy@xxxxxxxxxx> - 3.6-14
- convert license to SPDX
* Thu Jul 18 2024 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 3.6-13
- Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Fri Jun  7 2024 Python Maint <python-maint@xxxxxxxxxx> - 3.6-12
- Rebuilt for Python 3.13
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2327534 - CVE-2024-48990 needrestart: arbitrary code execution via PYTHONPATH environment variable [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2327534
  [ 2 ] Bug #2327540 - CVE-2024-11003 needrestart: local privilege escalation via unsanitized input [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2327540
  [ 3 ] Bug #2327545 - CVE-2024-48992 needrestart: arbitrary code execution via RUBYLIB environment variable [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2327545
  [ 4 ] Bug #2327552 - CVE-2024-48991 needrestart: arbitrary code execution via race condition [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2327552
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-d2124788a8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux