5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Activity log
- Created suggestion
Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
References
Affected products
- <2.24.1
- *
Matching in nixpkgs
pkgs.tuned
Tuning Profile Delivery Mechanism for Linux
pkgs.python312Packages.mypy-boto3-neptunedata
Type annotations for boto3 neptunedata
-
nixos-unstable boto3-neptunedata-1.40.0
- nixpkgs-unstable boto3-neptunedata-1.40.0
- nixos-unstable-small boto3-neptunedata-1.40.0
-
nixos-25.11 boto3-neptunedata-1.41.0
- nixpkgs-25.11-darwin boto3-neptunedata-1.41.0
pkgs.python313Packages.mypy-boto3-neptunedata
Type annotations for boto3 neptunedata
-
nixos-unstable boto3-neptunedata-1.40.0
- nixpkgs-unstable boto3-neptunedata-1.40.0
- nixos-unstable-small boto3-neptunedata-1.40.0
-
nixos-25.11 boto3-neptunedata-1.41.0
- nixpkgs-25.11-darwin boto3-neptunedata-1.41.0
Package maintainers
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>
-
@mbalatsko Maksym Balatsko <mbalatsko@gmail.com>
-
@getchoo Seth Flynn <getchoo@tuta.io>