cvelist/2024/1xxx/CVE-2024-1048.json

165 lines
7.0 KiB
JSON
Raw Normal View History

2024-01-29 19:00:31 +00:00
{
2024-02-06 18:00:33 +00:00
"data_version": "4.0",
2024-01-29 19:00:31 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-1048",
2024-02-06 18:00:33 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2024-01-29 19:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-06 18:00:33 +00:00
"value": "A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-02-06 19:00:33 +00:00
"value": "Incomplete Cleanup",
"cweId": "CWE-459"
2024-02-06 18:00:33 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
2024-05-22 18:00:32 +00:00
"product_name": "Red Hat Enterprise Linux 8",
2024-02-06 18:00:33 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 15:00:36 +00:00
"versions": [
{
2024-05-22 18:00:32 +00:00
"version": "1:2.02-156.el8",
2024-04-30 15:00:36 +00:00
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
2024-02-06 18:00:33 +00:00
}
}
]
}
},
{
2024-05-22 18:00:32 +00:00
"product_name": "Red Hat Enterprise Linux 9",
2024-02-06 18:00:33 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-05-22 18:00:32 +00:00
"versions": [
{
"version": "1:2.06-77.el9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
2024-02-06 18:00:33 +00:00
}
}
]
}
},
{
2024-05-22 18:00:32 +00:00
"product_name": "Red Hat Enterprise Linux 6",
2024-02-06 18:00:33 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-04-30 15:00:36 +00:00
"defaultStatus": "unaffected"
2024-02-06 18:00:33 +00:00
}
}
]
}
},
{
2024-05-22 18:00:32 +00:00
"product_name": "Red Hat Enterprise Linux 7",
2024-02-06 18:00:33 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-05-22 18:00:32 +00:00
"defaultStatus": "unaffected"
2024-02-06 18:00:33 +00:00
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
2024-04-30 15:00:36 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:2456",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:2456"
},
2024-05-22 18:00:32 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:3184",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:3184"
},
2024-02-06 18:00:33 +00:00
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1048",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-1048"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256827",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2256827"
},
2024-04-02 15:14:14 +00:00
{
2024-04-25 17:00:33 +00:00
"url": "https://www.openwall.com/lists/oss-security/2024/02/06/3",
2024-04-02 15:14:14 +00:00
"refsource": "MISC",
2024-04-25 17:00:33 +00:00
"name": "https://www.openwall.com/lists/oss-security/2024/02/06/3"
2024-02-06 18:00:33 +00:00
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Solar Designer (CIQ/Rocky Linux) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
2024-02-06 19:00:33 +00:00
"baseScore": 3.3,
2024-02-06 18:00:33 +00:00
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
2024-02-06 19:00:33 +00:00
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
2024-02-06 18:00:33 +00:00
"version": "3.1"
2024-01-29 19:00:31 +00:00
}
]
}
}