Bug 2324541 (CVE-2024-52337) - CVE-2024-52337 tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
Summary: CVE-2024-52337 tuned: improper sanitization of `instance_name` parameter of t...
Keywords:
Status: NEW
Alias: CVE-2024-52337
Deadline: 2024-11-26
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-08 13:07 UTC by OSIDB Bzimport
Modified: 2025-04-11 07:38 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10381 0 None None None 2024-11-26 15:34:44 UTC
Red Hat Product Errata RHSA-2024:10384 0 None None None 2024-11-26 15:44:37 UTC
Red Hat Product Errata RHSA-2024:11161 0 None None None 2024-12-17 06:26:30 UTC
Red Hat Product Errata RHSA-2025:0195 0 None None None 2025-01-09 14:49:37 UTC
Red Hat Product Errata RHSA-2025:0327 0 None None None 2025-01-15 09:41:52 UTC
Red Hat Product Errata RHSA-2025:0368 0 None None None 2025-01-16 11:39:22 UTC
Red Hat Product Errata RHSA-2025:1785 0 None None None 2025-02-25 07:18:36 UTC
Red Hat Product Errata RHSA-2025:1802 0 None None None 2025-02-25 11:28:05 UTC

Description OSIDB Bzimport 2024-11-08 13:07:06 UTC
The `instance_name` parameter of the `instance_create()` method is not sanitized. This string is later on used in logging and in the output of utilities like `tuned-adm get_instances`, or other third party programs that utilize tuned's D-Bus interface to obtain instance names.

By adding control characters to the instance name, log spoofing can be achieved. By placing newline characters into the name, seemingly independent and legit log lines can be added to the tuned log. By adding terminal control sequences the terminal emulators of administrators or
other users can be influenced

Comment 10 errata-xmlrpc 2024-11-26 15:34:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2024:10381 https://access.redhat.com/errata/RHSA-2024:10381

Comment 11 errata-xmlrpc 2024-11-26 15:44:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10384 https://access.redhat.com/errata/RHSA-2024:10384

Comment 13 errata-xmlrpc 2024-12-17 06:26:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:11161 https://access.redhat.com/errata/RHSA-2024:11161

Comment 15 errata-xmlrpc 2025-01-09 14:49:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:0195 https://access.redhat.com/errata/RHSA-2025:0195

Comment 16 errata-xmlrpc 2025-01-15 09:41:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:0327 https://access.redhat.com/errata/RHSA-2025:0327

Comment 17 errata-xmlrpc 2025-01-16 11:39:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:0368 https://access.redhat.com/errata/RHSA-2025:0368

Comment 18 errata-xmlrpc 2025-02-25 07:18:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:1785 https://access.redhat.com/errata/RHSA-2025:1785

Comment 19 errata-xmlrpc 2025-02-25 11:28:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:1802 https://access.redhat.com/errata/RHSA-2025:1802


Note You need to log in before you can comment on or make changes to this bug.