openSUSE-SU-2025:0068-1: important: Security update for dcmtk
openSUSE-SU-2025:14822-1: moderate: grub2-2.12-35.1 on GA media
openSUSE-SU-2025:0068-1: important: Security update for dcmtk
openSUSE Security Update: Security update for dcmtk
_______________________________
Announcement ID: openSUSE-SU-2025:0068-1
Rating: important
References: #1237355 #1237365 #1237369
Cross-References: CVE-2025-25472 CVE-2025-25474 CVE-2025-25475
CVSS scores:
CVE-2025-25472 (SUSE): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
CVE-2025-25474 (SUSE): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
CVE-2025-25475 (SUSE): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for dcmtk fixes the following issues:
- CVE-2025-25472: Fixed a denial of service via a crafted DCM file
(boo#1237369).
- CVE-2025-25474: Fixed a denial of service via a crafted DICOM file
(boo#1237365).
- CVE-2025-25475: Fixed a buffer overflow via the component
/dcmimgle/diinpxt.h (boo#1237355).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2025-68=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
dcmtk-3.6.9-bp156.4.6.1
dcmtk-devel-3.6.9-bp156.4.6.1
libdcmtk19-3.6.9-bp156.4.6.1
References:
https://www.suse.com/security/cve/CVE-2025-25472.html
https://www.suse.com/security/cve/CVE-2025-25474.html
https://www.suse.com/security/cve/CVE-2025-25475.html
https://bugzilla.suse.com/1237355
https://bugzilla.suse.com/1237365
https://bugzilla.suse.com/1237369
openSUSE-SU-2025:14822-1: moderate: grub2-2.12-35.1 on GA media
# grub2-2.12-35.1 on GA media
Announcement ID: openSUSE-SU-2025:14822-1
Rating: moderate
Cross-References:
* CVE-2024-45774
* CVE-2024-45775
* CVE-2024-45776
* CVE-2024-45777
* CVE-2024-45778
* CVE-2024-45779
* CVE-2024-45780
* CVE-2024-45781
* CVE-2024-45782
* CVE-2024-45783
* CVE-2024-56737
* CVE-2025-0622
* CVE-2025-0624
* CVE-2025-0677
* CVE-2025-0678
* CVE-2025-0684
* CVE-2025-0685
* CVE-2025-0686
* CVE-2025-0689
* CVE-2025-0690
* CVE-2025-1118
* CVE-2025-1125
CVSS scores:
* CVE-2024-45774 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45776 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45778 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45780 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56737 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56737 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0622 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0624 ( SUSE ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-0677 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0677 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0678 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0678 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0684 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0685 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0685 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0686 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0686 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0689 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0689 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0690 ( SUSE ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-0690 ( SUSE ): 7.3 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-1118 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-1118 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-1125 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1125 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 22 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the grub2-2.12-35.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* grub2 2.12-35.1
* grub2-branding-upstream 2.12-35.1
* grub2-common 2.12-35.1
* grub2-i386-efi 2.12-35.1
* grub2-i386-efi-bls 2.12-35.1
* grub2-i386-efi-debug 2.12-35.1
* grub2-i386-efi-extras 2.12-35.1
* grub2-i386-pc 2.12-35.1
* grub2-i386-pc-debug 2.12-35.1
* grub2-i386-pc-extras 2.12-35.1
* grub2-snapper-plugin 2.12-35.1
* grub2-systemd-sleep-plugin 2.12-35.1
* grub2-x86_64-efi 2.12-35.1
* grub2-x86_64-efi-bls 2.12-35.1
* grub2-x86_64-efi-debug 2.12-35.1
* grub2-x86_64-efi-extras 2.12-35.1
* grub2-x86_64-xen 2.12-35.1
* grub2-x86_64-xen-debug 2.12-35.1
* grub2-x86_64-xen-extras 2.12-35.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45774.html
* https://www.suse.com/security/cve/CVE-2024-45775.html
* https://www.suse.com/security/cve/CVE-2024-45776.html
* https://www.suse.com/security/cve/CVE-2024-45777.html
* https://www.suse.com/security/cve/CVE-2024-45778.html
* https://www.suse.com/security/cve/CVE-2024-45779.html
* https://www.suse.com/security/cve/CVE-2024-45780.html
* https://www.suse.com/security/cve/CVE-2024-45781.html
* https://www.suse.com/security/cve/CVE-2024-45782.html
* https://www.suse.com/security/cve/CVE-2024-45783.html
* https://www.suse.com/security/cve/CVE-2024-56737.html
* https://www.suse.com/security/cve/CVE-2025-0622.html
* https://www.suse.com/security/cve/CVE-2025-0624.html
* https://www.suse.com/security/cve/CVE-2025-0677.html
* https://www.suse.com/security/cve/CVE-2025-0678.html
* https://www.suse.com/security/cve/CVE-2025-0684.html
* https://www.suse.com/security/cve/CVE-2025-0685.html
* https://www.suse.com/security/cve/CVE-2025-0686.html
* https://www.suse.com/security/cve/CVE-2025-0689.html
* https://www.suse.com/security/cve/CVE-2025-0690.html
* https://www.suse.com/security/cve/CVE-2025-1118.html
* https://www.suse.com/security/cve/CVE-2025-1125.html