A script injection vulnerability was identified in the Tuned package. The instance_create() D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with script_pre or script_post options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.
{
"binaries": [
{
"binary_name": "tuned",
"binary_version": "2.15.0-1ubuntu1"
},
{
"binary_name": "tuned-gtk",
"binary_version": "2.15.0-1ubuntu1"
},
{
"binary_name": "tuned-utils",
"binary_version": "2.15.0-1ubuntu1"
},
{
"binary_name": "tuned-utils-systemtap",
"binary_version": "2.15.0-1ubuntu1"
}
]
}{
"binaries": [
{
"binary_name": "tuned",
"binary_version": "2.21.0-1ubuntu2"
},
{
"binary_name": "tuned-gtk",
"binary_version": "2.21.0-1ubuntu2"
},
{
"binary_name": "tuned-utils",
"binary_version": "2.21.0-1ubuntu2"
},
{
"binary_name": "tuned-utils-systemtap",
"binary_version": "2.21.0-1ubuntu2"
}
]
}{
"binaries": [
{
"binary_name": "tuned",
"binary_version": "2.24.1-1ubuntu1"
},
{
"binary_name": "tuned-gtk",
"binary_version": "2.24.1-1ubuntu1"
},
{
"binary_name": "tuned-ppd",
"binary_version": "2.24.1-1ubuntu1"
},
{
"binary_name": "tuned-utils",
"binary_version": "2.24.1-1ubuntu1"
},
{
"binary_name": "tuned-utils-systemtap",
"binary_version": "2.24.1-1ubuntu1"
}
]
}{
"binaries": [
{
"binary_name": "tuned",
"binary_version": "2.25.1-1ubuntu1"
},
{
"binary_name": "tuned-gtk",
"binary_version": "2.25.1-1ubuntu1"
},
{
"binary_name": "tuned-ppd",
"binary_version": "2.25.1-1ubuntu1"
},
{
"binary_name": "tuned-utils",
"binary_version": "2.25.1-1ubuntu1"
},
{
"binary_name": "tuned-utils-systemtap",
"binary_version": "2.25.1-1ubuntu1"
}
]
}