UNIX Symbolic Link (Symlink) Following Affecting rt-linux-tools/stalld package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-RTLINUXTOOLSSTALLD-8451981
  • published3 Dec 2024
  • disclosed29 Nov 2024
  • creditMatthias Gerstner

Introduced: 29 Nov 2024

NewCVE-2024-54159  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

There is no fixed version for rt-linux-tools/stalld.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following through the creation of a symbolic link in the /tmp/rtthrottle directory. An attacker can overwrite arbitrary files by creating a symlink that points to a critical file, which is then written to by the application.

CVSS Scores

version 4.0
version 3.1