vulnerability
SUSE: CVE-2024-45776: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:M/C:C/I:C/A:C) | May 30, 2025 | Dec 5, 2025 | Dec 5, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
May 30, 2025
Added
Dec 5, 2025
Modified
Dec 5, 2025
Description
When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.
Solutions
suse-upgrade-grub2suse-upgrade-grub2-arm64-efisuse-upgrade-grub2-arm64-efi-debugsuse-upgrade-grub2-arm64-efi-extrassuse-upgrade-grub2-branding-upstreamsuse-upgrade-grub2-commonsuse-upgrade-grub2-i386-pcsuse-upgrade-grub2-i386-pc-debugsuse-upgrade-grub2-i386-pc-extrassuse-upgrade-grub2-i386-xen-debugsuse-upgrade-grub2-powerpc-ieee1275suse-upgrade-grub2-powerpc-ieee1275-debugsuse-upgrade-grub2-powerpc-ieee1275-extrassuse-upgrade-grub2-s390x-emususe-upgrade-grub2-s390x-emu-debugsuse-upgrade-grub2-s390x-emu-extrassuse-upgrade-grub2-snapper-pluginsuse-upgrade-grub2-systemd-sleep-pluginsuse-upgrade-grub2-x86_64-efisuse-upgrade-grub2-x86_64-efi-debugsuse-upgrade-grub2-x86_64-efi-extrassuse-upgrade-grub2-x86_64-xensuse-upgrade-grub2-x86_64-xen-debugsuse-upgrade-grub2-x86_64-xen-extras
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.