SUSE update for grub2



Risk Low
Patch available YES
Number of vulnerabilities 22
CVE-ID CVE-2024-45774
CVE-2024-45775
CVE-2024-45776
CVE-2024-45777
CVE-2024-45778
CVE-2024-45779
CVE-2024-45780
CVE-2024-45781
CVE-2024-45782
CVE-2024-45783
CVE-2024-56737
CVE-2025-0622
CVE-2025-0624
CVE-2025-0677
CVE-2025-0678
CVE-2025-0684
CVE-2025-0685
CVE-2025-0686
CVE-2025-0689
CVE-2025-0690
CVE-2025-1118
CVE-2025-1125
CWE-ID CWE-787
CWE-388
CWE-190
CWE-476
CWE-122
CWE-416
CWE-254
Exploitation vector Local
Public exploit N/A
Vulnerable software
SUSE Linux Enterprise High Performance Computing LTSS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing ESPOS 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP5
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

grub2-s390x-emu
Operating systems & Components / Operating system package or component

grub2-s390x-emu-debug
Operating systems & Components / Operating system package or component

grub2-x86_64-efi
Operating systems & Components / Operating system package or component

grub2-i386-pc-extras
Operating systems & Components / Operating system package or component

grub2-x86_64-efi-debug
Operating systems & Components / Operating system package or component

grub2-snapper-plugin
Operating systems & Components / Operating system package or component

grub2-arm64-efi-extras
Operating systems & Components / Operating system package or component

grub2-i386-efi
Operating systems & Components / Operating system package or component

grub2-i386-pc-debug
Operating systems & Components / Operating system package or component

grub2-powerpc-ieee1275-debug
Operating systems & Components / Operating system package or component

grub2-i386-efi-debug
Operating systems & Components / Operating system package or component

grub2-x86_64-xen-debug
Operating systems & Components / Operating system package or component

grub2-x86_64-xen-extras
Operating systems & Components / Operating system package or component

grub2-i386-xen-debug
Operating systems & Components / Operating system package or component

grub2-x86_64-xen
Operating systems & Components / Operating system package or component

grub2-powerpc-ieee1275-extras
Operating systems & Components / Operating system package or component

grub2-i386-xen
Operating systems & Components / Operating system package or component

grub2-i386-pc
Operating systems & Components / Operating system package or component

grub2-s390x-emu-extras
Operating systems & Components / Operating system package or component

grub2-x86_64-efi-extras
Operating systems & Components / Operating system package or component

grub2-arm64-efi-debug
Operating systems & Components / Operating system package or component

grub2-powerpc-ieee1275
Operating systems & Components / Operating system package or component

grub2-systemd-sleep-plugin
Operating systems & Components / Operating system package or component

grub2-i386-xen-extras
Operating systems & Components / Operating system package or component

grub2-arm64-efi
Operating systems & Components / Operating system package or component

grub2-i386-efi-extras
Operating systems & Components / Operating system package or component

grub2-debugsource
Operating systems & Components / Operating system package or component

grub2-branding-upstream
Operating systems & Components / Operating system package or component

grub2
Operating systems & Components / Operating system package or component

grub2-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 22 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU104065

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45774

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when parsing JPEG files. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper error handling

EUVDB-ID: #VU104066

Risk: Low

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45775

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect handling of memory allocation failures within the grub_extcmd_dispatcher() function. A local user can perform a denial of service attack or corrupt the IVT data.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Integer overflow

EUVDB-ID: #VU104067

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45776

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_mofile_open() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Integer overflow

EUVDB-ID: #VU104068

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45777

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_gettext_getstr_from_position() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Integer overflow

EUVDB-ID: #VU104069

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45778

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when reading BFS filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Integer overflow

EUVDB-ID: #VU104070

Risk: Low

CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45779

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to integer overflow within the BFS filesystem driver. A local user can trigger an integer overflow and corrupt data.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

EUVDB-ID: #VU104072

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45780

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when handling tar files. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds write

EUVDB-ID: #VU104076

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45781

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when ready symbolic link name from a UFS filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds write

EUVDB-ID: #VU104077

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45782

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when reading a volume's name within the grub_fs_mount() function in HFS filesystem driver. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU104078

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45783

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when failing to mount a HFS+. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Heap-based buffer overflow

EUVDB-ID: #VU104091

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56737

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the fs/hfs.c when reading sblock data from HFS filesystem. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU104079

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0622

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error caused by not removing hooks when the related module is being unloaded. A local user can execute arbitrary code with elevated privileges.


Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Out-of-bounds write

EUVDB-ID: #VU104080

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0624

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the grub_net_search_config_file() function. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Integer overflow

EUVDB-ID: #VU104081

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0677

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when performing a symlink lookup within the grub_ufs_lookup_symlink() function in UFS filesystem driver. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Integer overflow

EUVDB-ID: #VU104082

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0678

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in squash4 fs module. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds write

EUVDB-ID: #VU104083

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0684

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when performing a symlink lookup from a reiserfs filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Integer overflow

EUVDB-ID: #VU104084

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0685

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when reading data from a jfs filesystem within the grub_jfs_lookup_symlink() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Integer overflow

EUVDB-ID: #VU104085

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0686

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_romfs_read_symlink() function when performing a symlink lookup from a romfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Heap-based buffer overflow

EUVDB-ID: #VU104086

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0689

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the grub_udf_read_block() function when reading data from disk. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Integer overflow

EUVDB-ID: #VU104087

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0690

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows an attacker to escalate privileges on the system.

The vulnerability exists due to integer overflow when reading data from the keyboard input. An attacker with physical access to the system can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Security features bypass

EUVDB-ID: #VU104088

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-1118

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the dump command is not blocked when grub is in lockdown mode. A local user can read any data from the system memory.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Integer overflow

EUVDB-ID: #VU104089

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-1125

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the hfsplus_open_compressed_real() function when reading data from a hfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package grub2 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise High Performance Computing LTSS 15: SP5

SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5

SUSE Linux Enterprise Server 15 SP5: LTSS

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

grub2-s390x-emu: before 2.06-150500.29.43.2

grub2-s390x-emu-debug: before 2.06-150500.29.43.2

grub2-x86_64-efi: before 2.06-150500.29.43.2

grub2-i386-pc-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-debug: before 2.06-150500.29.43.2

grub2-snapper-plugin: before 2.06-150500.29.43.2

grub2-arm64-efi-extras: before 2.06-150500.29.43.2

grub2-i386-efi: before 2.06-150500.29.43.2

grub2-i386-pc-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2

grub2-i386-efi-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen-extras: before 2.06-150500.29.43.2

grub2-i386-xen-debug: before 2.06-150500.29.43.2

grub2-x86_64-xen: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2

grub2-i386-xen: before 2.06-150500.29.43.2

grub2-i386-pc: before 2.06-150500.29.43.2

grub2-s390x-emu-extras: before 2.06-150500.29.43.2

grub2-x86_64-efi-extras: before 2.06-150500.29.43.2

grub2-arm64-efi-debug: before 2.06-150500.29.43.2

grub2-powerpc-ieee1275: before 2.06-150500.29.43.2

grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2

grub2-i386-xen-extras: before 2.06-150500.29.43.2

grub2-arm64-efi: before 2.06-150500.29.43.2

grub2-i386-efi-extras: before 2.06-150500.29.43.2

grub2-debugsource: before 2.06-150500.29.43.2

grub2-branding-upstream: before 2.06-150500.29.43.2

grub2: before 2.06-150500.29.43.2

grub2-debuginfo: before 2.06-150500.29.43.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###