First published: Fri Jan 12 2024(Updated: )
Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Relax-and-recover Relax-and-recover | <=2.7 | |
SUSE Linux Enterprise Server | =15.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23301 is considered a high severity vulnerability due to its potential to expose sensitive system secrets to local attackers.
To fix CVE-2024-23301, update Relax-and-Recover to the latest version that addresses the issue or adjust your GRUB configuration to prevent creating world-readable initrd files.
CVE-2024-23301 affects Relax-and-Recover versions up to 2.7 as well as specific versions of SUSE Linux Enterprise, Red Hat Enterprise Linux, and Fedora.
Yes, local attackers can exploit CVE-2024-23301 by gaining unauthorized access to sensitive information in the world-readable initrd.
Yes, CVE-2024-23301 has been discussed in various online forums and GitHub repositories, providing insights into its impact and fixes.