Risk | Low |
Patch available | YES |
Number of vulnerabilities | 22 |
CVE-ID | CVE-2024-45774 CVE-2024-45775 CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2024-45781 CVE-2024-45782 CVE-2024-45783 CVE-2024-56737 CVE-2025-0622 CVE-2025-0624 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0686 CVE-2025-0689 CVE-2025-0690 CVE-2025-1118 CVE-2025-1125 |
CWE-ID | CWE-787 CWE-388 CWE-190 CWE-476 CWE-122 CWE-416 CWE-254 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing ESPOS 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system grub2-s390x-emu Operating systems & Components / Operating system package or component grub2-s390x-emu-debug Operating systems & Components / Operating system package or component grub2-x86_64-efi Operating systems & Components / Operating system package or component grub2-i386-pc-extras Operating systems & Components / Operating system package or component grub2-x86_64-efi-debug Operating systems & Components / Operating system package or component grub2-snapper-plugin Operating systems & Components / Operating system package or component grub2-arm64-efi-extras Operating systems & Components / Operating system package or component grub2-i386-efi Operating systems & Components / Operating system package or component grub2-i386-pc-debug Operating systems & Components / Operating system package or component grub2-powerpc-ieee1275-debug Operating systems & Components / Operating system package or component grub2-i386-efi-debug Operating systems & Components / Operating system package or component grub2-x86_64-xen-debug Operating systems & Components / Operating system package or component grub2-x86_64-xen-extras Operating systems & Components / Operating system package or component grub2-i386-xen-debug Operating systems & Components / Operating system package or component grub2-x86_64-xen Operating systems & Components / Operating system package or component grub2-powerpc-ieee1275-extras Operating systems & Components / Operating system package or component grub2-i386-xen Operating systems & Components / Operating system package or component grub2-i386-pc Operating systems & Components / Operating system package or component grub2-s390x-emu-extras Operating systems & Components / Operating system package or component grub2-x86_64-efi-extras Operating systems & Components / Operating system package or component grub2-arm64-efi-debug Operating systems & Components / Operating system package or component grub2-powerpc-ieee1275 Operating systems & Components / Operating system package or component grub2-systemd-sleep-plugin Operating systems & Components / Operating system package or component grub2-i386-xen-extras Operating systems & Components / Operating system package or component grub2-arm64-efi Operating systems & Components / Operating system package or component grub2-i386-efi-extras Operating systems & Components / Operating system package or component grub2-debugsource Operating systems & Components / Operating system package or component grub2-branding-upstream Operating systems & Components / Operating system package or component grub2 Operating systems & Components / Operating system package or component grub2-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 22 vulnerabilities.
EUVDB-ID: #VU104065
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45774
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when parsing JPEG files. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104066
Risk: Low
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45775
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect handling of memory allocation failures within the grub_extcmd_dispatcher() function. A local user can perform a denial of service attack or corrupt the IVT data.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104067
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45776
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the grub_mofile_open() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104068
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45777
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the grub_gettext_getstr_from_position() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104069
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45778
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when reading BFS filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104070
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45779
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to integer overflow within the BFS filesystem driver. A local user can trigger an integer overflow and corrupt data.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104072
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45780
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when handling tar files. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104076
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45781
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when ready symbolic link name from a UFS filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104077
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45782
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when reading a volume's name within the grub_fs_mount() function in HFS filesystem driver. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104078
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45783
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error when failing to mount a HFS+. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104091
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56737
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the fs/hfs.c when reading sblock data from HFS filesystem. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104079
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0622
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error caused by not removing hooks when the related module is being unloaded. A local user can execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104080
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0624
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the grub_net_search_config_file() function. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104081
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0677
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when performing a symlink lookup within the grub_ufs_lookup_symlink() function in UFS filesystem driver. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104082
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0678
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in squash4 fs module. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104083
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0684
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when performing a symlink lookup from a reiserfs filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104084
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0685
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when reading data from a jfs filesystem within the grub_jfs_lookup_symlink() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104085
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0686
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the grub_romfs_read_symlink() function when performing a symlink lookup from a romfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104086
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0689
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the grub_udf_read_block() function when reading data from disk. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104087
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-0690
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows an attacker to escalate privileges on the system.
The vulnerability exists due to integer overflow when reading data from the keyboard input. An attacker with physical access to the system can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104088
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-1118
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to the dump command is not blocked when grub is in lockdown mode. A local user can read any data from the system memory.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104089
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-1125
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the hfsplus_open_compressed_real() function when reading data from a hfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
grub2-s390x-emu: before 2.06-150500.29.43.2
grub2-s390x-emu-debug: before 2.06-150500.29.43.2
grub2-x86_64-efi: before 2.06-150500.29.43.2
grub2-i386-pc-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-debug: before 2.06-150500.29.43.2
grub2-snapper-plugin: before 2.06-150500.29.43.2
grub2-arm64-efi-extras: before 2.06-150500.29.43.2
grub2-i386-efi: before 2.06-150500.29.43.2
grub2-i386-pc-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-debug: before 2.06-150500.29.43.2
grub2-i386-efi-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen-extras: before 2.06-150500.29.43.2
grub2-i386-xen-debug: before 2.06-150500.29.43.2
grub2-x86_64-xen: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275-extras: before 2.06-150500.29.43.2
grub2-i386-xen: before 2.06-150500.29.43.2
grub2-i386-pc: before 2.06-150500.29.43.2
grub2-s390x-emu-extras: before 2.06-150500.29.43.2
grub2-x86_64-efi-extras: before 2.06-150500.29.43.2
grub2-arm64-efi-debug: before 2.06-150500.29.43.2
grub2-powerpc-ieee1275: before 2.06-150500.29.43.2
grub2-systemd-sleep-plugin: before 2.06-150500.29.43.2
grub2-i386-xen-extras: before 2.06-150500.29.43.2
grub2-arm64-efi: before 2.06-150500.29.43.2
grub2-i386-efi-extras: before 2.06-150500.29.43.2
grub2-debugsource: before 2.06-150500.29.43.2
grub2-branding-upstream: before 2.06-150500.29.43.2
grub2: before 2.06-150500.29.43.2
grub2-debuginfo: before 2.06-150500.29.43.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250587-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.