UbuntuUpdates.org

Package "needrestart"

Name: needrestart

Description:

check which daemons need to be restarted after library upgrades

Latest version: 3.5-5ubuntu2.4
Release: jammy (22.04)
Level: security
Repository: main
Homepage: https://github.com/liske/needrestart

Links


Download "needrestart"


Other versions of "needrestart" in Jammy

Repository Area Version
base main 3.5-5ubuntu2
updates main 3.5-5ubuntu2.4

Changelog

Version: 3.5-5ubuntu2.4 2024-12-05 20:06:57 UTC

  needrestart (3.5-5ubuntu2.4) jammy-security; urgency=medium

  * SECURITY REGRESSION: false positives for killing processes in LXC
    (LP: #2089193)
    - debian/patches/lp2091096/0021-fix-lxc-fp.patch: use the value of exe
      to check for obsolete processes when exec is undefined

 -- Sudhakar Verma <email address hidden> Thu, 05 Dec 2024 17:28:38 +0530

Source diff to previous version
2089193 containerd false positive in 3.6-7ubuntu4.3

Version: 3.5-5ubuntu2.3 2024-11-26 11:06:46 UTC

  needrestart (3.5-5ubuntu2.3) jammy-security; urgency=medium

  * SECURITY REGRESSION: false positives for killing processes (LP: #2089193)
    - debian/patches/lp2089193/0020-fix-chroot-mountns-fp.patch: ignore check
      for obsolete processes in chrooted or containerized processes

 -- Sudhakar Verma <email address hidden> Tue, 26 Nov 2024 10:48:34 +0530

Source diff to previous version
2089193 containerd false positive in 3.6-7ubuntu4.3

Version: 3.5-5ubuntu2.2 2024-11-19 19:07:10 UTC

  needrestart (3.5-5ubuntu2.2) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect usage of PYTHONPATH environment variable
    - debian/patches/CVE-2024-48990.patch: chdir to a clean directory
      to avoid loading arbirary objects, sanitize PYTHONPATH before
      spawning a new python interpreter
    - CVE-2024-48990
  * SECURITY UPDATE: race condition for checking path to python
    - debian/patches/CVE-2024-48991.patch: sync path for both check
      and usage for python interpreter
    - CVE-2024-48991
  * SECURITY UPDATE: incorrect usage of RUBYLIB environment variable
    - debian/patches/CVE-2024-48992.patch: chdir to a clean directory
      to avoid loading arbirary objects, sanitize RUBYLIB before
      spawning a new ruby interpreter
    - CVE-2024-48992
  * SECURITY UPDATE: incorrect usage of Perl ScanDeps
    - debian/patches/CVE-2024-11003.patch: remove usage of ScanDeps
      to avoid parsing arbitrary code
    - CVE-2024-11003

 -- Sudhakar Verma <email address hidden> Mon, 18 Nov 2024 13:51:23 +0530

Source diff to previous version

Version: 3.5-5ubuntu2.1 2022-05-17 18:06:29 UTC

  needrestart (3.5-5ubuntu2.1) jammy-security; urgency=medium

  * SECURITY UPDATE: arbitrary code exec via unanchored regexes
    - debian/patches/CVE-2022-30688.patch: improve regexes in
      perl/lib/NeedRestart/Interp/Perl.pm,
      perl/lib/NeedRestart/Interp/Python.pm,
      perl/lib/NeedRestart/Interp/Ruby.pm.
    - CVE-2022-30688

 -- Marc Deslauriers <email address hidden> Mon, 16 May 2022 07:08:25 -0400

CVE-2022-30688 local privilege escalation



About   -   Send Feedback to @ubuntu_updates