Security update for grub2
| Announcement ID: | SUSE-SU-2025:01961-1 |
|---|---|
| Release Date: | 2025-06-16T10:03:23Z |
| Rating: | important |
| References: | |
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 24 vulnerabilities can now be installed.
Description:
This update for grub2 fixes the following issues:
- CVE-2023-4692: nfs: out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (bsc#1215935).
- CVE-2023-4693: nfs: out-of-bounds read at fs/ntfs.c (bsc#1215936).
- CVE-2024-45774: heap overflows in JPEG parser (bsc#1233609).
- CVE-2024-45775: missing NULL check in extcmd parser (bsc#1233610).
- CVE-2024-45776: overflow in .MO file (gettext) handling (bsc#1233612).
- CVE-2024-45777: integer overflow in gettext (bsc#1233613).
- CVE-2024-45778: bfs filesystem not fuzzing stable (bsc#1233606).
- CVE-2024-45779: bfs: heap overflow (bsc#1233608).
- CVE-2024-45780: overflow in tar/cpio (bsc#1233614).
- CVE-2024-45781: ufs: strcpy overflow (bsc#1233617).
- CVE-2024-45782: hfs: strcpy overflow (bsc#1233615).
- CVE-2024-45783: hfsplus: refcount overflow (bsc#1233616).
- CVE-2024-56737: heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem (bsc#1234958).
- CVE-2025-0622: command/gpg: Use-after-free due to hooks not being removed on module unload (bsc#1236317).
- CVE-2025-0624: net: Out-of-bounds write in grub_net_search_config_file() (bsc#1236316).
- CVE-2025-0677: ufs: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (bsc#1237002).
- CVE-2025-0678: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data (bsc#1237006).
- CVE-2025-0684: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237008).
- CVE-2025-0685: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237009).
- CVE-2025-0686: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237010).
- CVE-2025-0689: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution (bsc#1237011).
- CVE-2025-0690: read: Integer overflow may lead to out-of-bounds write (bsc#1237012).
- CVE-2025-1118: commands/dump: The dump command is not in lockdown when secure boot is enabled (bsc#1237013).
- CVE-2025-1125: fs/hfs: Interger overflow may lead to heap based out-of-bounds write (bsc#1237014).
Other bugfixes:
- Bump upstream SBAT generation to 5
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1961=1
Package List:
-
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
- grub2-debugsource-2.04-150300.3.11.1
- grub2-debuginfo-2.04-150300.3.11.1
- grub2-2.04-150300.3.11.1
-
SUSE Linux Enterprise Micro 5.1 (noarch)
- grub2-x86_64-xen-2.04-150300.3.11.1
- grub2-i386-pc-2.04-150300.3.11.1
- grub2-arm64-efi-2.04-150300.3.11.1
- grub2-x86_64-efi-2.04-150300.3.11.1
- grub2-snapper-plugin-2.04-150300.3.11.1
-
SUSE Linux Enterprise Micro 5.1 (s390x)
- grub2-s390x-emu-2.04-150300.3.11.1
References:
- https://www.suse.com/security/cve/CVE-2023-4692.html
- https://www.suse.com/security/cve/CVE-2023-4693.html
- https://www.suse.com/security/cve/CVE-2024-45774.html
- https://www.suse.com/security/cve/CVE-2024-45775.html
- https://www.suse.com/security/cve/CVE-2024-45776.html
- https://www.suse.com/security/cve/CVE-2024-45777.html
- https://www.suse.com/security/cve/CVE-2024-45778.html
- https://www.suse.com/security/cve/CVE-2024-45779.html
- https://www.suse.com/security/cve/CVE-2024-45780.html
- https://www.suse.com/security/cve/CVE-2024-45781.html
- https://www.suse.com/security/cve/CVE-2024-45782.html
- https://www.suse.com/security/cve/CVE-2024-45783.html
- https://www.suse.com/security/cve/CVE-2024-56737.html
- https://www.suse.com/security/cve/CVE-2025-0622.html
- https://www.suse.com/security/cve/CVE-2025-0624.html
- https://www.suse.com/security/cve/CVE-2025-0677.html
- https://www.suse.com/security/cve/CVE-2025-0678.html
- https://www.suse.com/security/cve/CVE-2025-0684.html
- https://www.suse.com/security/cve/CVE-2025-0685.html
- https://www.suse.com/security/cve/CVE-2025-0686.html
- https://www.suse.com/security/cve/CVE-2025-0689.html
- https://www.suse.com/security/cve/CVE-2025-0690.html
- https://www.suse.com/security/cve/CVE-2025-1118.html
- https://www.suse.com/security/cve/CVE-2025-1125.html
- https://bugzilla.suse.com/show_bug.cgi?id=1215935
- https://bugzilla.suse.com/show_bug.cgi?id=1215936
- https://bugzilla.suse.com/show_bug.cgi?id=1233606
- https://bugzilla.suse.com/show_bug.cgi?id=1233608
- https://bugzilla.suse.com/show_bug.cgi?id=1233609
- https://bugzilla.suse.com/show_bug.cgi?id=1233610
- https://bugzilla.suse.com/show_bug.cgi?id=1233612
- https://bugzilla.suse.com/show_bug.cgi?id=1233613
- https://bugzilla.suse.com/show_bug.cgi?id=1233614
- https://bugzilla.suse.com/show_bug.cgi?id=1233615
- https://bugzilla.suse.com/show_bug.cgi?id=1233616
- https://bugzilla.suse.com/show_bug.cgi?id=1233617
- https://bugzilla.suse.com/show_bug.cgi?id=1234958
- https://bugzilla.suse.com/show_bug.cgi?id=1236316
- https://bugzilla.suse.com/show_bug.cgi?id=1236317
- https://bugzilla.suse.com/show_bug.cgi?id=1237002
- https://bugzilla.suse.com/show_bug.cgi?id=1237006
- https://bugzilla.suse.com/show_bug.cgi?id=1237008
- https://bugzilla.suse.com/show_bug.cgi?id=1237009
- https://bugzilla.suse.com/show_bug.cgi?id=1237010
- https://bugzilla.suse.com/show_bug.cgi?id=1237011
- https://bugzilla.suse.com/show_bug.cgi?id=1237012
- https://bugzilla.suse.com/show_bug.cgi?id=1237013
- https://bugzilla.suse.com/show_bug.cgi?id=1237014