vulnerability
SUSE: CVE-2025-0690: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:M/C:C/I:C/A:C) | Feb 19, 2025 | Feb 21, 2025 | Nov 4, 2025 |
Severity
6
CVSS
(AV:L/AC:M/Au:M/C:C/I:C/A:C)
Published
Feb 19, 2025
Added
Feb 21, 2025
Modified
Nov 4, 2025
Description
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
Solutions
suse-upgrade-grub2suse-upgrade-grub2-arm64-efisuse-upgrade-grub2-arm64-efi-debugsuse-upgrade-grub2-arm64-efi-extrassuse-upgrade-grub2-branding-upstreamsuse-upgrade-grub2-commonsuse-upgrade-grub2-i386-pcsuse-upgrade-grub2-i386-pc-debugsuse-upgrade-grub2-i386-pc-extrassuse-upgrade-grub2-i386-xen-debugsuse-upgrade-grub2-powerpc-ieee1275suse-upgrade-grub2-powerpc-ieee1275-debugsuse-upgrade-grub2-powerpc-ieee1275-extrassuse-upgrade-grub2-s390x-emususe-upgrade-grub2-s390x-emu-debugsuse-upgrade-grub2-s390x-emu-extrassuse-upgrade-grub2-snapper-pluginsuse-upgrade-grub2-systemd-sleep-pluginsuse-upgrade-grub2-x86_64-efisuse-upgrade-grub2-x86_64-efi-debugsuse-upgrade-grub2-x86_64-efi-extrassuse-upgrade-grub2-x86_64-xensuse-upgrade-grub2-x86_64-xen-debugsuse-upgrade-grub2-x86_64-xen-extras
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.