A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/02/06/3 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2020:0335 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 | Issue Tracking Third Party Advisory |
| https://seclists.org/oss-sec/2019/q4/101 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/02/06/3 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2020:0335 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 | Issue Tracking Third Party Advisory |
| https://seclists.org/oss-sec/2019/q4/101 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
29 Apr 2025, 20:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* |
|
| First Time |
Redhat enterprise Linux Server Tus
Redhat enterprise Linux Server Aus |
29 Apr 2025, 15:57
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.9 |
| References | () http://www.openwall.com/lists/oss-security/2024/02/06/3 - Third Party Advisory |
21 Nov 2024, 04:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/02/06/3 - | |
| References | () https://access.redhat.com/errata/RHSA-2020:0335 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 - Issue Tracking, Third Party Advisory | |
| References | () https://seclists.org/oss-sec/2019/q4/101 - Mailing List, Third Party Advisory |
06 Feb 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2019-11-29 10:15
Updated : 2025-04-29 20:39
NVD link : CVE-2019-14865
Mitre link : CVE-2019-14865
CVE.ORG link : CVE-2019-14865
JSON object : View
Products Affected
gnu
- grub2
redhat
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_eus
- enterprise_linux
CWE
