CVE-2026-25701
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. * overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
| CWE | CWE-377 |
| Vendor | opensuse |
| Product | sdbootutil |
| Published | Feb 25, 2026 |
| Last Updated | Feb 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for opensuse sdbootutil
Be the first to know when new unknown vulnerabilities affecting opensuse sdbootutil are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
openSUSE / sdbootutil
? < 5880246d3a02642dc68f5c8cb474bf63cdb56bca
References
Credits
Matthias Gerstner of SUSE