Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2330297
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh109 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
Migrated Products
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2330297
(
CVE-2024-54661
) -
CVE-2024-54661
socat: arbitrary file overwrite via predictable /tmp directory
Summary:
CVE-2024-54661 socat: arbitrary file overwrite via predictable /tmp directory
Keywords
:
Security
Status
:
NEW
Alias:
CVE-2024-54661
Product:
Security Response
Classification:
Other
Component:
vulnerability
Sub Component:
---
Version:
unspecified
Hardware:
All
OS:
Linux
Priority:
medium
Severity:
medium
Target Milestone:
---
Assignee:
Product Security DevOps Team
QA Contact:
Docs Contact:
URL:
Whiteboard:
Depends On:
2330520
2330519
Blocks:
TreeView+
depends on
/
blocked
Reported:
2024-12-04 05:01 UTC by
OSIDB Bzimport
Modified:
2025-04-06 18:57 UTC (
History
)
CC List:
5 users
(
show
)
adudiak
kshier
omaciel
stcannon
yguenane
Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
Attachments
(Terms of Use)
Description
OSIDB Bzimport
2024-12-04 05:01:04 UTC
readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file.
Note
You need to
log in
before you can comment on or make changes to this bug.