SB2025091829 - Red Hat Enterprise Linux 10 update for grub2
Published: September 18, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2024-45776)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the grub_mofile_open() function when reading .mo file. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
2) Out-of-bounds write (CVE-ID: CVE-2024-45781)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when ready symbolic link name from a UFS filesystem. A local user can trigger an out-of-bounds write and execute arbitrary code.
3) Use-after-free (CVE-ID: CVE-2025-0622)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error caused by not removing hooks when the related module is being unloaded. A local user can execute arbitrary code with elevated privileges.
4) Integer overflow (CVE-ID: CVE-2025-0677)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow when performing a symlink lookup within the grub_ufs_lookup_symlink() function in UFS filesystem driver. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
5) Security features bypass (CVE-ID: CVE-2025-1118)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to the dump command is not blocked when grub is in lockdown mode. A local user can read any data from the system memory.
Remediation
Install update from vendor's website.