[CLSA-2026:1771954436] grub2: Fix of CVE-2025-61662
Type:
security
Severity:
Important
Release date:
2026-02-24 17:34:00 UTC
Description:
- CVE-2025-61662: fix use-after-free in gettext/gettext due to unregistered gettext command on module unload
Updated packages:
  • grub2-common-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:42c41c788e0d3cfc3f654839b785eb7c1f2ed0d0775511bb5407f183594bed4c
  • grub2-efi-ia32-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:cdf58070a3f40ea974d11e50f7b8218415b95b35ab4215152270aa6d272e7b1c
  • grub2-efi-ia32-cdboot-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:3e8f2533f3c211d74f296789483170802995e216b7ac36a1d36b1971f1d1592f
  • grub2-efi-ia32-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:cb37b18daef59baec358c034062eb08636e08f52312d8b9c57c9e2c5714a1d98
  • grub2-efi-x64-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:7200afd7ecb67825440e6771da38bd85216e10fbd345e2bbdfd0cebf5854d53f
  • grub2-efi-x64-cdboot-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:dc3dc367b3c88ea0b85c38ba26bbe7775816f07f68a174fec6ff1ee77d43b530
  • grub2-efi-x64-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:5ea9a23aea0fe87c24def81b625cebf1e4fbb210a15aa10c78ddf20b138961e4
  • grub2-pc-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:ed2a13f518ad067df0f836f2fa639fa73cbd4718e7e0b2e51ddf4a9039962dd4
  • grub2-pc-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:023f2d02928412fc11ff165eddb665075bf38596a7b32d75b70732c6630cf2a2
  • grub2-tools-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:cb1bbe8b0f77490bbc164c25ed768006b30b6ef70304423258704189fe91510b
  • grub2-tools-efi-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:a8675136b92638aadc88d9ddccc1a7e0bacb0d31afd53df49200f11e5d7b9a39
  • grub2-tools-extra-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:3792a0e8cd4ee7ce01d86ac9f8c9cbed3d0c37f3003268bc42a7f6bc82296cef
  • grub2-tools-minimal-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:511669c6a79e72d6ad8d926499cdc286985c998d2feaf2011efaf1fee8142b8e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.