Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-1048
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grub2: grub2-set-bootflag can be abused by local (pseudo-)users
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
清理环节不完整
Source: NVD (National Vulnerability Database)
Vulnerability Title
grub2 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
grub2是美国GNU社区的一款Linux系统引导程序。 grub2存在安全漏洞,该漏洞源于如果程序在重命名操作之前被终止,临时文件将不会被删除,并且在多次调用时可能会填满文件系统,导致文件系统没有可用的 inode 或 blocks。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 8 1:2.02-156.el8 ~ * cpe:/o:redhat:enterprise_linux:8::baseos
Red HatRed Hat Enterprise Linux 9 1:2.06-77.el9 ~ * cpe:/o:redhat:enterprise_linux:9::baseos
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
II. Public POCs for CVE-2024-1048
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-1048
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-1048

No comments yet


Leave a comment