{"id":"RLSA-2025:16154","summary":"Moderate: grub2 security update","details":"The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.\n\nSecurity Fix(es):\n\n* grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776)\n\n* grub2: fs/ufs: OOB write in the heap (CVE-2024-45781)\n\n* grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622)\n\n* grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677)\n\n* grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-11T05:29:32.802666Z","published":"2025-10-03T19:57:04.772748Z","upstream":["CVE-2024-45776","CVE-2024-45781","CVE-2025-0622","CVE-2025-0677","CVE-2025-1118"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:16154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339182"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345857"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345865"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346116"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346137"}],"affected":[{"package":{"name":"grub2","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/grub2?distro=rocky-linux-10-0&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.12-15.el10_0"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:16154.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}