CVE-2019-14865

A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*

History

29 Apr 2025, 20:39

Type Values Removed Values Added
First Time Redhat enterprise Linux Server Aus
Redhat enterprise Linux Server Tus
CPE cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*

29 Apr 2025, 15:57

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/02/06/3 - () http://www.openwall.com/lists/oss-security/2024/02/06/3 - Third Party Advisory
CVSS v2 : 4.9
v3 : 5.5
v2 : 4.9
v3 : 5.9

21 Nov 2024, 04:27

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/02/06/3 - () http://www.openwall.com/lists/oss-security/2024/02/06/3 -
References () https://access.redhat.com/errata/RHSA-2020:0335 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0335 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 - Issue Tracking, Third Party Advisory
References () https://seclists.org/oss-sec/2019/q4/101 - Mailing List, Third Party Advisory () https://seclists.org/oss-sec/2019/q4/101 - Mailing List, Third Party Advisory

06 Feb 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/06/3 -

Information

Published : 2019-11-29 10:15

Updated : 2025-04-29 20:39


NVD link : CVE-2019-14865

Mitre link : CVE-2019-14865

CVE.ORG link : CVE-2019-14865


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_tus
  • enterprise_linux_server_aus
  • enterprise_linux
  • enterprise_linux_eus

gnu

  • grub2
CWE
CWE-267

Privilege Defined With Unsafe Actions

NVD-CWE-noinfo