Log Spoofing Flaw Found in Tuned Package

CVE-2024-52337
5.5MEDIUM

Key Information

Vendor
Red Hat
Status
Fast Datapath For Rhel 7
Fast Datapath For Rhel 8
Fast Datapath For Rhel 9
Red Hat Enterprise Linux 6
Vendor
CVE Published:
26 November 2024

Summary

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 5.5 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database

Credit

Red Hat would like to thank Matthias Gerstner (SUSE Security Team) for reporting this issue.
.