Filing this for completeness. --- /tmp/mgorny-dev-scripts/portage/net-misc/socat-1.8.0.1/work/socat-1.8.0.1/CHANGES 2024-08-24 17:06:11.000000000 +0100 +++ /tmp/mgorny-dev-scripts/portage/net-misc/socat-1.8.0.2/work/socat-1.8.0.2/CHANGES 2024-12-06 10:44:17.000000000 +0000 @@ -1,4 +1,21 @@ +####################### V 1.8.0.2: + +Security: + Socat security advisory 9 + CVE-2024-54661: Arbitrary file overwrite + Socat 1.6.0.0 through 1.8.0.1 and version 2 distributions contain a + wrapper script "readline.sh" that uses a predictable temporary + directory, allowing unprivileged users to overwrite arbitrary files + belonging to the scripts caller. + This is fixed in Version 1.8.0.2 + Mitigating factors: readline.sh is usually neither installed in a bin + directory nor is it documented. Major Linux distributions install it in + examples/ or doc/; however it is invoked by test.sh script. + Thanks to Wolfgang Frisch from SuSE for finding and reporting this + issue. + Test: READLINE_SH_OVERWRITE
(In reply to Sam James from comment #0) > Filing this for completeness. > We don't install readline.sh.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bf52bce8d00e0a1534c609ad4d3ebfae98e93879 commit bf52bce8d00e0a1534c609ad4d3ebfae98e93879 Author: Sam James <sam@gentoo.org> AuthorDate: 2024-12-13 15:30:39 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2024-12-13 15:33:56 +0000 net-misc/socat: add 1.8.0.2 wrt bug #946374, as I noted in the bug, we don't install readline.sh, so we're unaffected. Closes: https://bugs.gentoo.org/940740 Bug: https://bugs.gentoo.org/946374 Signed-off-by: Sam James <sam@gentoo.org> net-misc/socat/Manifest | 1 + net-misc/socat/socat-1.8.0.2.ebuild | 56 +++++++++++++++++++++++++++++++++++++ 2 files changed, 57 insertions(+)