Local Root Exploit via Configuration Dictionary
CVE-2024-1929

7.5HIGH

Key Information:

Vendor

Fedora

Vendor
CVE Published:
8 May 2024

What is CVE-2024-1929?

The vulnerability in dnf5daemon-server prior to version 5.1.17 arises from an unsafe handling of configuration entries through the D-Bus interface. Specifically, when the org.rpm.dnf.v0.SessionManager.open_session method is called, it processes a key/value map that includes a 'config' key. This key contains another map with configuration overrides that are sent to libdnf5::Base without proper validation. This lack of sanity checking allows malicious users to manipulate configuration aspects extensively. Consequently, an attacker can control the loading of shared libraries, resulting in unauthorized root access, thereby compromising both confidentiality and integrity of the system.

Affected Version(s)

dnf5daemon-server Linux 5.1.16<=

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.