First published: Wed Dec 04 2024(Updated: )
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
socat | <1.8.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54661 is considered a high severity vulnerability due to its potential to expose sensitive data.
To fix CVE-2024-54661, upgrade socat to version 1.8.0.2 or later.
CVE-2024-54661 may allow unauthorized access to information stored in the /tmp/$USER/stderr2 file.
Versions of socat prior to 1.8.0.2 are affected by CVE-2024-54661.
CVE-2024-54661 is classified as a local vulnerability, requiring local user access to exploit.