// For flags

CVE-2024-56737

SUSE Security Advisory - SUSE-SU-2025:0586-1

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

GNU GRUB (aka GRUB2) through 2.12 has a heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem.

This update for grub2 fixes the following issues. Fixed strcpy overflow in ufs. Fixed a heap-based buffer overflow in hfs. Fixed strcpy overflow in hfs. Fixed an overflow in tar/cpio. Fixed a refcount overflow in hfsplus. Fixed a heap overflow in JPEG parser. Fixed a missing NULL check in extcmd parser. Fixed an overflow in .MO file handling. Fixed an integer overflow in gettext. Fixed bfs filesystem by removing it from lockdown capable modules. Fixed a heap overflow in bfs. Fixed an issue that can bypass TPM-bound disk encryption on SLM encrypted Images. Fixed an out-of-bounds write during the network boot process. Fixed a use-after-free when handling hooks during module unload in command/gpg. Fixed an integer overflow that may lead to an out-of-bounds write through the read command. Fixed an issue where the dump command was not being blocked when grub was in lockdown mode. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs. Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. Fixed an integer overflow that may lead to an out-of-bounds write in hfs. Fixed an integer overflow that may lead to an out-of-bounds write in squash4.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-12-29 CVE Reserved
  • 2024-12-29 CVE Published
  • 2024-12-31 CVE Updated
  • 2025-08-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-122: Heap-based Buffer Overflow
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
GNU
Search vendor "GNU"
GRUB2
Search vendor "GNU" for product "GRUB2"
>= 2.00 <= 2.12
Search vendor "GNU" for product "GRUB2" and version " >= 2.00 <= 2.12"
en
Affected