CVE-2024-52337
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
26/11/2024
Last modified:
25/02/2025
Description
A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:10381
- https://access.redhat.com/errata/RHSA-2024:10384
- https://access.redhat.com/errata/RHSA-2024:11161
- https://access.redhat.com/errata/RHSA-2025:0195
- https://access.redhat.com/errata/RHSA-2025:0327
- https://access.redhat.com/errata/RHSA-2025:0368
- https://access.redhat.com/errata/RHSA-2025:0879
- https://access.redhat.com/errata/RHSA-2025:0880
- https://access.redhat.com/errata/RHSA-2025:0881
- https://access.redhat.com/errata/RHSA-2025:1785
- https://access.redhat.com/errata/RHSA-2025:1802
- https://access.redhat.com/security/cve/CVE-2024-52337
- https://bugzilla.redhat.com/show_bug.cgi?id=2324541
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://www.openwall.com/lists/oss-security/2024/11/28/1
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://www.openwall.com/lists/oss-security/2024/11/28/2



