发布时间: 2024年12月6日
修改时间: 2024年12月6日
A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Local | |
CVSS评分 | N/A | 7.8 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4401 | tuned security update | 2025年2月8日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5 | tuned | Fixed |
KY3.5.2 | tuned | Fixed |
KY3.5.3 | tuned | Fixed |
V6 | tuned | Fixed |