<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1232</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-03-07</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-03-07</InitialReleaseDate>
		<CurrentReleaseDate>2025-03-07</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-03-07</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">grub2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GNU GRUB is a Multiboot boot loader. It was derived from GRUB, the GRand Unified Bootloader, which was originally designed and implemented by Erich Stefan Boleyn.

Security Fix(es):

A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.(CVE-2024-45774)

A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.(CVE-2024-45778)

GNU GRUB (aka GRUB2) through 2.12 has a heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem.(CVE-2024-56737)

A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.(CVE-2025-0622)

A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.(CVE-2025-0624)

A flaw was found in grub2. When performing a symlink lookup, the grub&apos;s UFS module checks the inode&apos;s data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.(CVE-2025-0677)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">grub2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45774</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45778</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-56737</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0622</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0624</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0677</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45774</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45778</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-56737</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0622</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0624</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0677</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="grub2-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-2.06-51.oe2203sp3.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="grub2-common-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-common-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-aa64-modules-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-ia32-modules-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-x64-modules-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-help-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-help-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-pc-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-pc-modules-2.06-51.oe2203sp3.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="grub2-debuginfo-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-debuginfo-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-debugsource-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-debugsource-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-aa64-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-aa64-cdboot-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-extra-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-extra-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-minimal-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-minimal-2.06-51.oe2203sp3.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="grub2-debuginfo-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-debuginfo-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-debugsource-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-debugsource-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-ia32-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-ia32-cdboot-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-x64-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-efi-x64-cdboot-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-pc-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-pc-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-efi-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-efi-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-extra-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-extra-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-minimal-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">grub2-tools-minimal-2.06-51.oe2203sp3.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2024-45774</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.7</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2024-45778</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.1</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNU GRUB (aka GRUB2) through 2.12 has a heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2024-56737</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2025-0622</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2025-0624</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.6</BaseScore>
				<Vector>AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When performing a symlink lookup, the grub&apos;s UFS module checks the inode&apos;s data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2025-0677</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1232</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>