CVE-2024-54159
Linux Red Hat vulnerability analysis and mitigation

Overview

stalld through 1.19.7 contains a security vulnerability that allows local users to cause a denial of service (file overwrite) via a /tmp/rtthrottle symlink attack. The vulnerability was discovered during a routine review of the contained systemd service and was reported to upstream on September 9, 2024 (SUSE Blog).

Technical details

The vulnerability exists in the throttlectl.sh script, which is called with root privileges as a pre and post script in stalld's systemd unit. The script uses a fixed /tmp path (/tmp/rtthrottle) to cache original values from /proc/sys/kernel/schedrtruntimeus and /proc/sys/kernel/schedrtperiodus. This implementation allows for both symlink attacks and file pre-creation attacks. The issue has been assigned a CVSS v3.1 Base Score of 4.1 MEDIUM (Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L) (NVD).

Impact

A local attacker could exploit this vulnerability to overwrite arbitrary files in the system, leading to a denial of service condition. Additionally, through file pre-creation attacks, an attacker can manipulate values that will be written to the pseudo files in /proc/sys/kernel/schedrt*, resulting in local denial of service or local integrity violations (SUSE Blog).

Mitigation and workarounds

The suggested fix is to place the file into the /run/stalld directory, which is owned by root. This directory is already created via stalld's systemd unit. Additional hardening measures like implementing PrivateTmp=yes in the systemd unit could prevent future temporary file issues. The throttlectl script should also set the errexit shell option to exit upon unexpected errors (SUSE Blog).

Additional resources


SourceThis report was generated using AI

Related Linux Red Hat vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64775HIGH7.5
  • Apache StrutsApache Struts
  • guice-multibindings
NoYesDec 01, 2025
CVE-2025-13836MEDIUM6.3
  • Python InterpreterPython Interpreter
  • python39-devel:3.9::python39-toml
NoYesDec 01, 2025
CVE-2025-61915MEDIUM6
  • OpenPrinting CUPSOpenPrinting CUPS
  • libcups2-32bit
NoYesNov 29, 2025
CVE-2025-58436MEDIUM5.1
  • OpenPrinting CUPSOpenPrinting CUPS
  • cups-devel
NoYesNov 29, 2025
CVE-2025-66382LOW2.9
  • Linux DebianLinux Debian
  • xmlrpc-c-client
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management