{
  "threat_severity" : "Moderate",
  "public_date" : "2024-02-06T00:00:00Z",
  "bugzilla" : {
    "description" : "grub2: grub2-set-bootflag can be abused by local (pseudo-)users",
    "id" : "2256827",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2256827"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-459",
  "details" : [ "A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.", "A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks." ],
  "statement" : "The grub2-set-bootflag utility is a command line tool to set a bootflag in the GRUB environment block. This is a downstream utility and is shipped only in Red Hat Enterprise Linux 8 and 9.",
  "acknowledgement" : "Red Hat would like to thank Solar Designer (CIQ/Rocky Linux) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3184",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "grub2-1:2.02-156.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2456",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "grub2-1:2.06-77.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "grub",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "grub2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-1048\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-1048\nhttps://www.openwall.com/lists/oss-security/2024/02/06/3" ],
  "name" : "CVE-2024-1048",
  "csaw" : false
}