<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1292</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-03-14</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-03-14</InitialReleaseDate>
		<CurrentReleaseDate>2025-03-14</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-03-14</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">grub2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GNU GRUB is a Multiboot boot loader. It was derived from GRUB, the GRand Unified Bootloader, which was originally designed and implemented by Erich Stefan Boleyn.

Security Fix(es):

A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub&apos;s argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.(CVE-2024-45775)

When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.(CVE-2024-45776)

A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2&apos;s sensitive heap data, eventually leading to the circumvention of secure boot protections.(CVE-2024-45777)

A flaw was found in grub2. When reading a symbolic link&apos;s name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.(CVE-2024-45781)

A flaw was found in the HFS filesystem. When reading an HFS volume&apos;s name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name&apos;s length. This issue may read to a heap-based out-of-bounds writer, impacting grub&apos;s sensitive data integrity and eventually leading to a secure boot protection bypass.(CVE-2024-45782)

A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn&apos;t properly set an ERRNO value. This issue may lead to a NULL pointer access.(CVE-2024-45783)

A flaw was found in grub2. When reading data from a squash4 filesystem, grub&apos;s squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub&apos;s internal critical data and may result in arbitrary code execution, by-passing secure boot protections.(CVE-2025-0678)

A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub&apos;s reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub&apos;s internal critical data and can result in arbitrary code execution, by-passing secure boot protections.(CVE-2025-0684)

A flaw was found in grub2. When reading data from a jfs filesystem, grub&apos;s jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub&apos;s internal critical data and may result in arbitrary code execution, by-passing secure boot protections.(CVE-2025-0685)

A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub&apos;s romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub&apos;s internal critical data and can result in arbitrary code execution by-passing secure boot protections.(CVE-2025-0686)

When reading data from disk, the grub&apos;s UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.(CVE-2025-0689)

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it&apos;s possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub&apos;s internal critical data and secure boot bypass is not discarded as consequence.(CVE-2025-0690)

A flaw was found in grub2. Grub&apos;s dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory.(CVE-2025-1118)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for grub2 is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">grub2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45775</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45776</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45777</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45781</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45782</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-45783</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0678</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0684</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0685</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0686</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0689</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-0690</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-1118</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45775</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45776</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45777</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45781</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45782</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-45783</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0678</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0684</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0685</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0686</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0689</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-0690</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-1118</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="grub2-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-2.06-51.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="grub2-common-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-common-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-aa64-modules-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-ia32-modules-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-x64-modules-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-help-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-help-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="grub2-pc-modules-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-pc-modules-2.06-51.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="grub2-debuginfo-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-debuginfo-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-debugsource-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-debugsource-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-aa64-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-aa64-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-aa64-cdboot-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-extra-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-extra-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-minimal-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-minimal-2.06-51.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="grub2-debuginfo-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-debuginfo-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-debugsource-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-debugsource-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-ia32-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-ia32-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-ia32-cdboot-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-x64-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-efi-x64-cdboot-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-efi-x64-cdboot-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-pc-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-pc-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-efi-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-efi-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-extra-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-extra-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="grub2-tools-minimal-2.06-51" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">grub2-tools-minimal-2.06-51.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub&apos;s argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45775</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.2</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45776</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.7</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2&apos;s sensitive heap data, eventually leading to the circumvention of secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45777</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.7</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When reading a symbolic link&apos;s name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45781</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.7</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the HFS filesystem. When reading an HFS volume&apos;s name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name&apos;s length. This issue may read to a heap-based out-of-bounds writer, impacting grub&apos;s sensitive data integrity and eventually leading to a secure boot protection bypass.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45782</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.7</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn&apos;t properly set an ERRNO value. This issue may lead to a NULL pointer access.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-45783</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.4</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When reading data from a squash4 filesystem, grub&apos;s squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub&apos;s internal critical data and may result in arbitrary code execution, by-passing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0678</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub&apos;s reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub&apos;s internal critical data and can result in arbitrary code execution, by-passing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0684</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When reading data from a jfs filesystem, grub&apos;s jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub&apos;s internal critical data and may result in arbitrary code execution, by-passing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0685</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub&apos;s romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub&apos;s internal critical data and can result in arbitrary code execution by-passing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0686</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When reading data from disk, the grub&apos;s UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0689</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.4</BaseScore>
				<Vector>AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it&apos;s possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub&apos;s internal critical data and secure boot bypass is not discarded as consequence.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-0690</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.1</BaseScore>
				<Vector>AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2. Grub&apos;s dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2025-1118</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.4</BaseScore>
				<Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>grub2 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1292</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>