CVE-2024-23301
Rocky Linux vulnerability analysis and mitigation

Overview

Relax-and-Recover (ReaR) through version 2.7 contains a security vulnerability where it creates a world-readable initrd when using GRUB_RESCUE=y configuration option. The vulnerability was discovered in January 2024 and assigned identifier CVE-2024-23301. The issue affects ReaR installations on multiple Linux distributions including Debian, Fedora, and Red Hat Enterprise Linux (NVD, Debian LTS).

Technical details

The vulnerability occurs when ReaR is configured with GRUB_RESCUE=y option, which causes the generated initrd (initial ramdisk) file to be created with world-readable permissions in the /boot directory. The issue has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating local access is required but no user interaction is needed for exploitation (NVD).

Impact

This vulnerability allows local attackers to gain access to system secrets that should only be readable by the root user. Since the initrd contains a copy of the recovery system, any sensitive information included in the backup could be exposed to unprivileged local users (GitHub Issue).

Mitigation and workarounds

The issue has been fixed in various distribution releases. Debian has released version 2.4+dfsg-1+deb10u1 for Debian 10 (Buster). Fedora has released version 2.7-8 for both Fedora 38 and 39. The fix involves making the initrd file accessible only by root through proper permission settings (Debian LTS, Fedora Update).

Community reactions

The vulnerability was initially reported by a SUSE customer and addressed through a collaborative effort between the ReaR development team and distribution maintainers. The fix was implemented through GitHub pull request #3123, which received positive feedback from the development community (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-43529HIGH8.8
  • Apple SafariApple Safari
  • pywebkitgtk
YesYesDec 17, 2025
CVE-2025-43541MEDIUM4.3
  • Apple SafariApple Safari
  • webkit2gtk4-devel
NoYesDec 17, 2025
CVE-2025-43536MEDIUM4.3
  • Apple SafariApple Safari
  • webkit2gtk3-devel
NoYesDec 17, 2025
CVE-2025-43535MEDIUM4.3
  • Apple SafariApple Safari
  • webkitgtk
NoYesDec 17, 2025
CVE-2025-43531LOW3.1
  • Apple SafariApple Safari
  • webkit2gtk3-minibrowser
NoYesDec 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management