| Vulnerability Name: | CVE-2019-14865 (CCN-172214) | ||||||||||||||||||
| Assigned: | 2019-10-24 | ||||||||||||||||||
| Published: | 2019-10-24 | ||||||||||||||||||
| Updated: | 2023-02-12 | ||||||||||||||||||
| Summary: | A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots. | ||||||||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H/E:U/RL:U/RC:R)
5.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||
| CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||
| Vulnerability Type: | CWE-267 | ||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-14865 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: Google Security Research Issue 1955 grub2: grub2-set-bootflag can corrupt environment Source: CCN Type: Red Hat Bugzilla - Bug 1764925 CVE-2019-14865 grub2: grub2-set-bootflag utility causes grubenv corruption rendering the system non-bootable Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN grub2-cve201914865-dos(172214) Source: CCN Type: Packet Storm Security [11-27-2019] Grub2 grub2-set-bootflag Environment Corruption Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: CCN Type: grub Web site Obtaining GRUB Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-14865 | ||||||||||||||||||
| Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||
| Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
| BACK | |||||||||||||||||||