CVE-2024-54159

4.1 MEDIUM

📋 TL;DR

CVE-2024-54159 is a local privilege escalation vulnerability in stalld (Starving CPUs and Latency Daemon) that allows local users to overwrite arbitrary files via a symlink attack targeting /tmp/rtthrottle. This affects systems running stalld versions up to 1.19.7 where local users can create symlinks in /tmp.

💻 Affected Systems

Products:
  • stalld (Starving CPUs and Latency Daemon)
Versions: All versions through 1.19.7
Operating Systems: Linux distributions with stalld installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where stalld is installed and running. Requires local user access to create symlinks in /tmp directory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker could overwrite critical system files (like /etc/passwd, /etc/shadow) leading to system compromise, privilege escalation, or permanent denial of service.

🟠

Likely Case

Local user causes denial of service by overwriting configuration files or creates persistence mechanisms through file manipulation.

🟢

If Mitigated

Minimal impact if proper file permissions and /tmp hardening are in place, limiting damage to non-critical files.

🌐 Internet-Facing: LOW - This requires local access to the system, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users (including compromised accounts) can exploit this, but requires specific conditions and access to /tmp.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local user access and ability to create symlinks in /tmp. Proof of concept details are publicly available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.19.8 and later

Vendor Advisory: https://security.opensuse.org/2024/11/29/stalld-fixed-tmp-file.html

Restart Required: Yes

Instructions:

1. Update stalld to version 1.19.8 or later using your package manager. 2. Restart the stalld service. 3. Verify the fix by checking the version and ensuring /tmp/rtthrottle symlink attacks are prevented.

🔧 Temporary Workarounds

Secure /tmp directory

linux

Harden /tmp directory permissions to prevent symlink attacks

chmod 1777 /tmp
mount -o remount,noexec,nosuid,nodev /tmp

Remove stalld if not needed

linux

Uninstall stalld if the service is not required

systemctl stop stalld
apt remove stalld
yum remove stalld
zypper remove stalld

🧯 If You Can't Patch

  • Restrict local user access to systems running stalld
  • Implement strict file permissions and monitoring on /tmp directory

🔍 How to Verify

Check if Vulnerable:

Check stalld version: stalld --version. If version is 1.19.7 or earlier, system is vulnerable.

Check Version:

stalld --version

Verify Fix Applied:

After updating, verify version is 1.19.8 or later and test that symlink creation in /tmp doesn't allow file overwrite by stalld.

📡 Detection & Monitoring

Log Indicators:

  • Failed file operations in /tmp directory
  • Unexpected stalld process behavior
  • Symlink creation attempts in /tmp

Network Indicators:

  • None - this is a local attack

SIEM Query:

Process creation where parent process is stalld AND file operations in /tmp directory

🔗 References

📤 Share & Export