{"id":"RLSA-2024:3184","summary":"Moderate: grub2 security update","details":"The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.\n\nSecurity Fix(es):\n\n* grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048)\n\n* grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692)\n\n* grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.","modified":"2026-03-11T06:29:18.579848Z","published":"2024-06-14T13:59:16.809606Z","upstream":["CVE-2023-4692","CVE-2023-4693","CVE-2024-1048"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:3184"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236613"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256827"}],"affected":[{"package":{"name":"grub2","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/grub2?distro=rocky-linux-8&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.02-156.el8.rocky.0.1"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:3184.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}