CVE-2024-1048
Grub2: grub2-set-bootflag can be abused by local (pseudo-)users
CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.
| CWE | CWE-459 |
| Published | Feb 6, 2024 |
| Last Updated | Nov 20, 2025 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new low vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Affected Versions
Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2456 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3184 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1048 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2256827 openwall.com: https://www.openwall.com/lists/oss-security/2024/02/06/3 openwall.com: http://www.openwall.com/lists/oss-security/2024/02/06/3 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/XRZQCVZ3XOASVFT6XLO7F2ZXOLOHIJZQ/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/YSJAEGRR3XHMBBBKYOVMII4P34IXEYPE/ security.netapp.com: https://security.netapp.com/advisory/ntap-20240223-0007/
Credits
Red Hat would like to thank Solar Designer (CIQ/Rocky Linux) for reporting this issue.