Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.0

openSUSE sdbootutil allows local users to access sensitive data

CVE-2026-25701
Summary

A vulnerability in openSUSE's sdbootutil program allows a local user to access sensitive information on your system, such as data that's supposed to be private. This could also allow the user to overwrite or manipulate system files. To protect your system, update sdbootutil to the latest version.

Original title
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found ...
Original description
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like:
* gain access to possible private information found in /var/lib/pcrlock.d
* manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored.
*  overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak.


This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
nvd CVSS4.0 7.0
Vulnerability type
CWE-377
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026