EulerOS 2.0 SP10 : grub2 (EulerOS-SA-2025-1799)

high Nessus Plugin ID 241799

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the grub2 packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.(CVE-2025-0622)

A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access.(CVE-2024-45783)

A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.(CVE-2024-45774)

grub2 allowed attackers with access to the grub shell to access files on the encrypted disks.(CVE-2024-49504)

When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.(CVE-2024-45776)

A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.(CVE-2024-45775)

Tenable has extracted the preceding description block directly from the EulerOS grub2 security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected grub2 packages.

See Also

http://www.nessus.org/u?c6a277d9

Plugin Details

Severity: High

ID: 241799

File Name: EulerOS_SA-2025-1799.nasl

Version: 1.1

Type: local

Published: 7/10/2025

Updated: 7/10/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2024-45776

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 7

Threat Score: 4

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-49504

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:grub2-efi-x64, p-cpe:/a:huawei:euleros:grub2-efi-x64-modules, p-cpe:/a:huawei:euleros:grub2-tools-efi, p-cpe:/a:huawei:euleros:grub2-tools, p-cpe:/a:huawei:euleros:grub2-pc-modules, p-cpe:/a:huawei:euleros:grub2-tools-extra, p-cpe:/a:huawei:euleros:grub2-tools-minimal, p-cpe:/a:huawei:euleros:grub2-pc, p-cpe:/a:huawei:euleros:grub2-common, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/10/2025

Vulnerability Publication Date: 4/11/2024

Reference Information

CVE: CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45783, CVE-2024-49504, CVE-2025-0622