Bug 2324541 (CVE-2024-52337)

Summary: CVE-2024-52337 tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: echaudro, fleitner, jskarvad, ktraynor, rkhan, security-response-team, sfaye, trathi, usurse
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2024-11-26   

Description OSIDB Bzimport 2024-11-08 13:07:06 UTC
The `instance_name` parameter of the `instance_create()` method is not sanitized. This string is later on used in logging and in the output of utilities like `tuned-adm get_instances`, or other third party programs that utilize tuned's D-Bus interface to obtain instance names.

By adding control characters to the instance name, log spoofing can be achieved. By placing newline characters into the name, seemingly independent and legit log lines can be added to the tuned log. By adding terminal control sequences the terminal emulators of administrators or
other users can be influenced

Comment 10 errata-xmlrpc 2024-11-26 15:34:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2024:10381 https://access.redhat.com/errata/RHSA-2024:10381

Comment 11 errata-xmlrpc 2024-11-26 15:44:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10384 https://access.redhat.com/errata/RHSA-2024:10384

Comment 13 errata-xmlrpc 2024-12-17 06:26:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:11161 https://access.redhat.com/errata/RHSA-2024:11161

Comment 15 errata-xmlrpc 2025-01-09 14:49:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:0195 https://access.redhat.com/errata/RHSA-2025:0195

Comment 16 errata-xmlrpc 2025-01-15 09:41:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:0327 https://access.redhat.com/errata/RHSA-2025:0327

Comment 17 errata-xmlrpc 2025-01-16 11:39:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:0368 https://access.redhat.com/errata/RHSA-2025:0368

Comment 18 errata-xmlrpc 2025-02-25 07:18:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:1785 https://access.redhat.com/errata/RHSA-2025:1785

Comment 19 errata-xmlrpc 2025-02-25 11:28:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:1802 https://access.redhat.com/errata/RHSA-2025:1802