openEuler 22.03 LTS SP3 update for grub2



Risk Low
Patch available YES
Number of vulnerabilities 16
CVE-ID CVE-2024-45775
CVE-2024-45776
CVE-2024-45777
CVE-2024-45779
CVE-2024-45780
CVE-2024-45781
CVE-2024-45782
CVE-2024-45783
CVE-2025-0678
CVE-2025-0684
CVE-2025-0685
CVE-2025-0686
CVE-2025-0689
CVE-2025-0690
CVE-2025-1118
CVE-2025-1125
CWE-ID CWE-388
CWE-190
CWE-787
CWE-476
CWE-122
CWE-254
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

grub2-tools-efi
Operating systems & Components / Operating system package or component

grub2-pc
Operating systems & Components / Operating system package or component

grub2-efi-x64-cdboot
Operating systems & Components / Operating system package or component

grub2-efi-x64
Operating systems & Components / Operating system package or component

grub2-efi-ia32-cdboot
Operating systems & Components / Operating system package or component

grub2-efi-ia32
Operating systems & Components / Operating system package or component

grub2-pc-modules
Operating systems & Components / Operating system package or component

grub2-help
Operating systems & Components / Operating system package or component

grub2-efi-x64-modules
Operating systems & Components / Operating system package or component

grub2-efi-ia32-modules
Operating systems & Components / Operating system package or component

grub2-efi-aa64-modules
Operating systems & Components / Operating system package or component

grub2-common
Operating systems & Components / Operating system package or component

grub2-tools-minimal
Operating systems & Components / Operating system package or component

grub2-tools-extra
Operating systems & Components / Operating system package or component

grub2-tools
Operating systems & Components / Operating system package or component

grub2-efi-aa64-cdboot
Operating systems & Components / Operating system package or component

grub2-efi-aa64
Operating systems & Components / Operating system package or component

grub2-debugsource
Operating systems & Components / Operating system package or component

grub2-debuginfo
Operating systems & Components / Operating system package or component

grub2
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 16 vulnerabilities.

1) Improper error handling

EUVDB-ID: #VU104066

Risk: Low

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45775

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect handling of memory allocation failures within the grub_extcmd_dispatcher() function. A local user can perform a denial of service attack or corrupt the IVT data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer overflow

EUVDB-ID: #VU104067

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45776

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_mofile_open() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Integer overflow

EUVDB-ID: #VU104068

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45777

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_gettext_getstr_from_position() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Integer overflow

EUVDB-ID: #VU104070

Risk: Low

CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45779

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to integer overflow within the BFS filesystem driver. A local user can trigger an integer overflow and corrupt data.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Integer overflow

EUVDB-ID: #VU104072

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45780

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when handling tar files. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds write

EUVDB-ID: #VU104076

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45781

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when ready symbolic link name from a UFS filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds write

EUVDB-ID: #VU104077

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45782

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when reading a volume's name within the grub_fs_mount() function in HFS filesystem driver. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU104078

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45783

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when failing to mount a HFS+. A local user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Integer overflow

EUVDB-ID: #VU104082

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0678

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in squash4 fs module. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds write

EUVDB-ID: #VU104083

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0684

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when performing a symlink lookup from a reiserfs filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Integer overflow

EUVDB-ID: #VU104084

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0685

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when reading data from a jfs filesystem within the grub_jfs_lookup_symlink() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Integer overflow

EUVDB-ID: #VU104085

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0686

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the grub_romfs_read_symlink() function when performing a symlink lookup from a romfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Heap-based buffer overflow

EUVDB-ID: #VU104086

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0689

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the grub_udf_read_block() function when reading data from disk. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Integer overflow

EUVDB-ID: #VU104087

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-0690

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows an attacker to escalate privileges on the system.

The vulnerability exists due to integer overflow when reading data from the keyboard input. An attacker with physical access to the system can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Security features bypass

EUVDB-ID: #VU104088

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-1118

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the dump command is not blocked when grub is in lockdown mode. A local user can read any data from the system memory.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Integer overflow

EUVDB-ID: #VU104089

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-1125

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the hfsplus_open_compressed_real() function when reading data from a hfs filesystem. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

grub2-tools-efi: before 2.06-51

grub2-pc: before 2.06-51

grub2-efi-x64-cdboot: before 2.06-51

grub2-efi-x64: before 2.06-51

grub2-efi-ia32-cdboot: before 2.06-51

grub2-efi-ia32: before 2.06-51

grub2-pc-modules: before 2.06-51

grub2-help: before 2.06-51

grub2-efi-x64-modules: before 2.06-51

grub2-efi-ia32-modules: before 2.06-51

grub2-efi-aa64-modules: before 2.06-51

grub2-common: before 2.06-51

grub2-tools-minimal: before 2.06-51

grub2-tools-extra: before 2.06-51

grub2-tools: before 2.06-51

grub2-efi-aa64-cdboot: before 2.06-51

grub2-efi-aa64: before 2.06-51

grub2-debugsource: before 2.06-51

grub2-debuginfo: before 2.06-51

grub2: before 2.06-51

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1291


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###