๐Ÿ” CVE Alert

CVE-2024-1048

LOW 3.3

Grub2: grub2-set-bootflag can be abused by local (pseudo-)users

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.

CWE CWE-459
Published Feb 6, 2024
Last Updated Nov 20, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new low vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2456 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:3184 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1048 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2256827 openwall.com: https://www.openwall.com/lists/oss-security/2024/02/06/3 openwall.com: http://www.openwall.com/lists/oss-security/2024/02/06/3 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/XRZQCVZ3XOASVFT6XLO7F2ZXOLOHIJZQ/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/YSJAEGRR3XHMBBBKYOVMII4P34IXEYPE/ security.netapp.com: https://security.netapp.com/advisory/ntap-20240223-0007/

Credits

Red Hat would like to thank Solar Designer (CIQ/Rocky Linux) for reporting this issue.