openEuler update for grub2



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-1048
CVE-2019-14865
CWE-ID CWE-399
CWE-267
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

grub2-tools-efi
Operating systems & Components / Operating system package or component

grub2-efi-ia32
Operating systems & Components / Operating system package or component

grub2-pc
Operating systems & Components / Operating system package or component

grub2-efi-x64
Operating systems & Components / Operating system package or component

grub2-efi-ia32-cdboot
Operating systems & Components / Operating system package or component

grub2-efi-x64-cdboot
Operating systems & Components / Operating system package or component

grub2-common
Operating systems & Components / Operating system package or component

grub2-efi-aa64-modules
Operating systems & Components / Operating system package or component

grub2-pc-modules
Operating systems & Components / Operating system package or component

grub2-help
Operating systems & Components / Operating system package or component

grub2-efi-ia32-modules
Operating systems & Components / Operating system package or component

grub2-efi-x64-modules
Operating systems & Components / Operating system package or component

grub2-debuginfo
Operating systems & Components / Operating system package or component

grub2-tools-extra
Operating systems & Components / Operating system package or component

grub2-debugsource
Operating systems & Components / Operating system package or component

grub2-efi-aa64
Operating systems & Components / Operating system package or component

grub2-tools
Operating systems & Components / Operating system package or component

grub2-efi-aa64-cdboot
Operating systems & Components / Operating system package or component

grub2-tools-minimal
Operating systems & Components / Operating system package or component

grub2
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU87164

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-1048

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the grub2-set-bootflag utility of grub2. The grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

grub2-tools-efi: before 2.04-32

grub2-efi-ia32: before 2.04-32

grub2-pc: before 2.04-32

grub2-efi-x64: before 2.04-32

grub2-efi-ia32-cdboot: before 2.04-32

grub2-efi-x64-cdboot: before 2.04-32

grub2-common: before 2.04-32

grub2-efi-aa64-modules: before 2.04-32

grub2-pc-modules: before 2.04-32

grub2-help: before 2.04-32

grub2-efi-ia32-modules: before 2.04-32

grub2-efi-x64-modules: before 2.04-32

grub2-debuginfo: before 2.04-32

grub2-tools-extra: before 2.04-32

grub2-debugsource: before 2.04-32

grub2-efi-aa64: before 2.04-32

grub2-tools: before 2.04-32

grub2-efi-aa64-cdboot: before 2.04-32

grub2-tools-minimal: before 2.04-32

grub2: before 2.04-32

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1253


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Privilege Defined With Unsafe Actions

EUVDB-ID: #VU97100

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-14865

CWE-ID: CWE-267 - Privilege Defined With Unsafe Actions

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the grub2-set-bootflag utility. A local user can run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

grub2-tools-efi: before 2.04-32

grub2-efi-ia32: before 2.04-32

grub2-pc: before 2.04-32

grub2-efi-x64: before 2.04-32

grub2-efi-ia32-cdboot: before 2.04-32

grub2-efi-x64-cdboot: before 2.04-32

grub2-common: before 2.04-32

grub2-efi-aa64-modules: before 2.04-32

grub2-pc-modules: before 2.04-32

grub2-help: before 2.04-32

grub2-efi-ia32-modules: before 2.04-32

grub2-efi-x64-modules: before 2.04-32

grub2-debuginfo: before 2.04-32

grub2-tools-extra: before 2.04-32

grub2-debugsource: before 2.04-32

grub2-efi-aa64: before 2.04-32

grub2-tools: before 2.04-32

grub2-efi-aa64-cdboot: before 2.04-32

grub2-tools-minimal: before 2.04-32

grub2: before 2.04-32

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1253


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###