GNU GRUB is a Multiboot boot loader. It was derived from GRUB, the GRand Unified Bootloader, which was originally designed and implemented by Erich Stefan Boleyn.
Security Fix(es):
A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.(CVE-2024-45774)
A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.(CVE-2024-45778)
GNU GRUB (aka GRUB2) through 2.12 has a heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem.(CVE-2024-56737)
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.(CVE-2025-0622)
A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.(CVE-2025-0624)
A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grubmalloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grubufslookupsymlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.(CVE-2025-0677)
{ "severity": "High" }
{ "aarch64": [ "grub2-debuginfo-2.06-51.oe2203sp3.aarch64.rpm", "grub2-debugsource-2.06-51.oe2203sp3.aarch64.rpm", "grub2-efi-aa64-2.06-51.oe2203sp3.aarch64.rpm", "grub2-efi-aa64-cdboot-2.06-51.oe2203sp3.aarch64.rpm", "grub2-tools-2.06-51.oe2203sp3.aarch64.rpm", "grub2-tools-extra-2.06-51.oe2203sp3.aarch64.rpm", "grub2-tools-minimal-2.06-51.oe2203sp3.aarch64.rpm" ], "src": [ "grub2-2.06-51.oe2203sp3.src.rpm" ], "x86_64": [ "grub2-debuginfo-2.06-51.oe2203sp3.x86_64.rpm", "grub2-debugsource-2.06-51.oe2203sp3.x86_64.rpm", "grub2-efi-ia32-2.06-51.oe2203sp3.x86_64.rpm", "grub2-efi-ia32-cdboot-2.06-51.oe2203sp3.x86_64.rpm", "grub2-efi-x64-2.06-51.oe2203sp3.x86_64.rpm", "grub2-efi-x64-cdboot-2.06-51.oe2203sp3.x86_64.rpm", "grub2-pc-2.06-51.oe2203sp3.x86_64.rpm", "grub2-tools-2.06-51.oe2203sp3.x86_64.rpm", "grub2-tools-efi-2.06-51.oe2203sp3.x86_64.rpm", "grub2-tools-extra-2.06-51.oe2203sp3.x86_64.rpm", "grub2-tools-minimal-2.06-51.oe2203sp3.x86_64.rpm" ], "noarch": [ "grub2-common-2.06-51.oe2203sp3.noarch.rpm", "grub2-efi-aa64-modules-2.06-51.oe2203sp3.noarch.rpm", "grub2-efi-ia32-modules-2.06-51.oe2203sp3.noarch.rpm", "grub2-efi-x64-modules-2.06-51.oe2203sp3.noarch.rpm", "grub2-help-2.06-51.oe2203sp3.noarch.rpm", "grub2-pc-modules-2.06-51.oe2203sp3.noarch.rpm" ] }