๐Ÿ” CVE Alert

CVE-2024-52337

MEDIUM 5.5

Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.

CWE CWE-20
Published Nov 26, 2024
Last Updated Jan 28, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

Red Hat / Fast Datapath for Red Hat Enterprise Linux 7
All versions affected
Red Hat / Fast Datapath for Red Hat Enterprise Linux 8
All versions affected
Red Hat / Fast Datapath for Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10381 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10384 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:11161 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0195 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0327 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0368 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0879 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0880 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:0881 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1785 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1802 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-52337 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2324541 security.opensuse.org: https://security.opensuse.org/2024/11/26/tuned-instance-create.html openwall.com: https://www.openwall.com/lists/oss-security/2024/11/28/1 openwall.com: https://www.openwall.com/lists/oss-security/2024/11/28/2

Credits

Red Hat would like to thank Matthias Gerstner (SUSE Security Team) for reporting this issue.