Informazioni sul CVE-2024-52337
Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
CWE ID: CWE-20
Base Score (CVSS): N/A
CVE: CVE-2024-52337
Descrizione: A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the ‘evil’ the attacker could mimic a valid TuneD log line and trick the administrator. The quotes ” are usually used in TuneD logs citing raw user input, so there will always be the ‘ character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned’s D-Bus interface for such operations.
Vettore di attacco CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Riassunto: Accesso: Local, Privilegi: Low, Interazione utente: None, Confidenzialità: None, Integrità: High, Disponibilità: None.
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|---|---|---|
Attack Vector (AV) | L | Local | L’attaccante deve avere accesso locale al sistema. |
Attack Complexity (AC) | L | Low | L’attacco non richiede condizioni particolari. |
Privileges Required (PR) | L | Low | Richiede pochi privilegi. |
User Interaction (UI) | N | None | Non è richiesta interazione dell’utente. |
Scope (S) | U | Unchanged | Il raggio d’azione non cambia. |
Confidentiality Impact (C) | N | None | Nessun impatto sulla riservatezza. |
Integrity Impact (I) | H | High | Grave impatto sull’integrità. |
Availability Impact (A) | N | None | Nessun impatto sulla disponibilità. |
Riferimenti esterni
- https://access.redhat.com/errata/RHSA-2024:10381
- https://access.redhat.com/errata/RHSA-2024:10384
- https://access.redhat.com/errata/RHSA-2024:11161
- https://access.redhat.com/errata/RHSA-2025:0195
- https://access.redhat.com/errata/RHSA-2025:0327
- https://access.redhat.com/errata/RHSA-2025:0368
- https://access.redhat.com/errata/RHSA-2025:0879
- https://access.redhat.com/errata/RHSA-2025:0880
- https://access.redhat.com/errata/RHSA-2025:0881
- https://access.redhat.com/errata/RHSA-2025:1785
- https://access.redhat.com/errata/RHSA-2025:1802
- https://access.redhat.com/security/cve/CVE-2024-52337
- https://bugzilla.redhat.com/show_bug.cgi?id=2324541
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://www.openwall.com/lists/oss-security/2024/11/28/1
Prodotti interessati
- Sconosciuto – Sconosciuto
- Red Hat – Fast Datapath for Red Hat Enterprise Linux 7
- Red Hat – Fast Datapath for Red Hat Enterprise Linux 8
- Red Hat – Fast Datapath for Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 7 Extended Lifecycle Support
- Red Hat – Red Hat Enterprise Linux 7 Extended Lifecycle Support
- Red Hat – Red Hat Enterprise Linux 8
- Red Hat – Red Hat Enterprise Linux 8
- Red Hat – Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
- Red Hat – Red Hat Enterprise Linux 8.4 Telecommunications Update Service
- Red Hat – Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
- Red Hat – Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
- Red Hat – Red Hat Enterprise Linux 8.6 Telecommunications Update Service
- Red Hat – Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
- Red Hat – Red Hat Enterprise Linux 8.8 Extended Update Support
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9
- Red Hat – Red Hat Enterprise Linux 9.2 Extended Update Support
- Red Hat – Red Hat Enterprise Linux 9.4 Extended Update Support
- Red Hat – Red Hat Enterprise Linux 6
Relazioni con altri prodotti
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 9
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 6
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.8 Extended Update Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 9.2 Extended Update Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.4 Telecommunications Update Service
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 7 Extended Lifecycle Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Red Hat Enterprise Linux 9.4 Extended Update Support
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Fast Datapath for Red Hat Enterprise Linux 8
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Fast Datapath for Red Hat Enterprise Linux 9
Anno: 2024
CWE: CWE-20
CVSS: 0.0
Produttore:Red Hat
Prodotto: Fast Datapath for Red Hat Enterprise Linux 7
Anno: 2024
CWE: CWE-20
CVSS: 0.0