[CLSA-2026:1778933429] Fix CVE(s): CVE-2024-11003, CVE-2024-48990, CVE-2024-48991, CVE-2024-48992
Type:
security
Severity:
Low
Release date:
2026-05-16 12:10:34 UTC
Description:
* SECURITY UPDATE: drop usage of Module::ScanDeps to prevent LPE - debian/patches/CVE-2024-11003.patch: drop usage of Module::ScanDeps to prevent LPE - CVE-2024-11003 * SECURITY UPDATE: do not set PYTHONPATH environment variable to prevent a LPE - debian/patches/CVE-2024-48990.patch: do not set PYTHONPATH environment variable to prevent a LPE - CVE-2024-48990 * SECURITY UPDATE: prevent race condition on /proc/$PID/exec evaluation and fix chroot/mountns regression - debian/patches/CVE-2024-48991.patch: prevent race condition on /proc/$PID/exec evaluation and fix chroot/mountns regression - CVE-2024-48991 * SECURITY UPDATE: do not set RUBYLIB environment variable to prevent a LPE - debian/patches/CVE-2024-48992.patch: do not set RUBYLIB environment variable to prevent a LPE - CVE-2024-48992
Updated packages:
  • needrestart_3.4-6ubuntu0.1+tuxcare.els1_all.deb
    sha:7c5b2c5f76806f875755ee8e522ce4d1530d676b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.