CVE-2024-54661
Published: December 5, 2024Last modified: June 24, 2025
Description
readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 9.8 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Notes
http://www.dest-unreach.org/socat/contrib/socat-secadv9.html
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | socat | Vulnerable (1.7.4.4-r0) |
| Stream | socat | Fixed (1.8.0.2-r0) |