Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python312Packages.mypy-boto3-neptunedata

Found 4 matching suggestions

View:
Compact
Detailed
Untriaged
created 1 month ago
tuned before 2.x allows local users to kill running processes …

tuned before 2.x allows local users to kill running processes due to insecure permissions with tuned's ktune service.

Affected products

tuned
  • ==2.10.0-1

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month ago
tuned 2.10.0 creates its PID file with insecure permissions which …

tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.

Affected products

tuned
  • ==2.10.0-1

Matching in nixpkgs

Package maintainers

Untriaged
Permalink CVE-2024-52336
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

References

Affected products

tuned
  • *
  • <2.24.1

Matching in nixpkgs

pkgs.tuned

Tuning Profile Delivery Mechanism for Linux

  • nixos-unstable -

Package maintainers

Untriaged
Permalink CVE-2024-52337
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months ago
Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.

References

Affected products

tuned
  • *
  • <2.24.1

Matching in nixpkgs

pkgs.tuned

Tuning Profile Delivery Mechanism for Linux

  • nixos-unstable -

Package maintainers