CVE-2024-52337

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
Configurations

No configuration.

History

25 Feb 2025, 12:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:1802 -

25 Feb 2025, 08:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:1785 -

03 Feb 2025, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0879 -
  • () https://access.redhat.com/errata/RHSA-2025:0880 -
  • () https://access.redhat.com/errata/RHSA-2025:0881 -

16 Jan 2025, 12:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0368 -

15 Jan 2025, 10:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0327 -

09 Jan 2025, 15:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:0195 -

18 Dec 2024, 09:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:11161 -

02 Dec 2024, 08:15

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2024/11/28/1 -

29 Nov 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.opensuse.org/2024/11/26/tuned-instance-create.html -
  • () https://www.openwall.com/lists/oss-security/2024/11/28/2 -
Summary
  • (es) Se encontró una falla de suplantación de registros en el paquete Tuned debido a una desinfección incorrecta de algunos argumentos de la API. Esta falla permite a un atacante pasar una secuencia controlada de caracteres; se pueden insertar nuevas líneas en el registro. En lugar de la línea 'evil', el atacante podría imitar una línea de registro válida de TuneD y engañar al administrador. Las comillas '' se utilizan generalmente en los registros de TuneD que citan la entrada del usuario sin procesar, por lo que siempre habrá el carácter ' al final de la entrada suplantada, y el administrador puede pasarlo por alto fácilmente. Esta cadena registrada se utiliza más tarde en el registro y en la salida de utilidades, por ejemplo, `tuned-adm get_instances` u otros programas de terceros que utilizan la interfaz D-Bus de Tuned para tales operaciones.

26 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:10381 -
  • () https://access.redhat.com/errata/RHSA-2024:10384 -

26 Nov 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-26 16:15

Updated : 2025-02-25 12:15


NVD link : CVE-2024-52337

Mitre link : CVE-2024-52337

CVE.ORG link : CVE-2024-52337


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation