Описание
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
A flaw was found in the readline.sh script of Socat through version 1.8.0.1. This vulnerability can allow attackers to exploit improper use of a predictable temporary file.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | socat | Out of support scope | ||
Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred | ||
Red Hat Enterprise Linux 8 | socat | Fixed | RHSA-2025:11042 | 15.07.2025 |
Red Hat Enterprise Linux 9 | socat | Fixed | RHSA-2025:10353 | 07.07.2025 |
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | socat | Fixed | RHSA-2025:10544 | 08.07.2025 |
Red Hat Enterprise Linux 9.4 Extended Update Support | socat | Fixed | RHSA-2025:10646 | 08.07.2025 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-377
https://bugzilla.redhat.com/show_bug.cgi?id=2330297socat: arbitrary file overwrite via predictable /tmp directory
EPSS
Процентиль: 39%
0.00169
Низкий
5.3 Medium
CVSS3
Связанные уязвимости
CVSS3: 9.8
ubuntu
8 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVSS3: 9.8
nvd
8 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVSS3: 9.8
debian
8 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 fi ...
EPSS
Процентиль: 39%
0.00169
Низкий
5.3 Medium
CVSS3