A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/02/06/3 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0335 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 | Issue Tracking Third Party Advisory |
https://seclists.org/oss-sec/2019/q4/101 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/02/06/3 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0335 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 | Issue Tracking Third Party Advisory |
https://seclists.org/oss-sec/2019/q4/101 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 Apr 2025, 20:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Server Tus |
|
CPE | cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* |
29 Apr 2025, 15:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/02/06/3 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.9 |
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/02/06/3 - | |
References | () https://access.redhat.com/errata/RHSA-2020:0335 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14865 - Issue Tracking, Third Party Advisory | |
References | () https://seclists.org/oss-sec/2019/q4/101 - Mailing List, Third Party Advisory |
06 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-11-29 10:15
Updated : 2025-04-29 20:39
NVD link : CVE-2019-14865
Mitre link : CVE-2019-14865
CVE.ORG link : CVE-2019-14865
JSON object : View
Products Affected
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_eus
gnu
- grub2
CWE