Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:10384

Опубликовано: 17 мар. 2025
Источник: rocky
Оценка: Important

Описание

Important: tuned security update

The tuned packages provide a service that tunes system settings according to a selected profile.

Security Fix(es):

  • tuned: script_pre and script_post options allow to pass arbitrary scripts executed by root (CVE-2024-52336)

  • tuned: improper sanitization of instance_name parameter of the instance_create() method (CVE-2024-52337)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
tunednoarch2.el9_5tuned-2.24.0-2.el9_5.noarch.rpm
tuned-profiles-cpu-partitioningnoarch2.el9_5tuned-profiles-cpu-partitioning-2.24.0-2.el9_5.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
12 месяцев назад

ELSA-2024-10384: tuned security update (IMPORTANT)

CVSS3: 7.8
redos
10 месяцев назад

Множественные уязвимости tuned

CVSS3: 7.8
ubuntu
12 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

CVSS3: 7.8
redhat
12 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

CVSS3: 7.8
nvd
12 месяцев назад

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.