[CLSA-2026:1771955086] grub2: Fix of CVE-2025-61662
Type:
security
Severity:
Important
Release date:
2026-02-24 17:44:50 UTC
Description:
- CVE-2025-61662: fix use-after-free in gettext/gettext due to unregistered gettext command on module unload
Updated packages:
  • grub2-common-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:d2cdfc7da62ad32c1a267fd433a2d24157839dc2a977c198bb3daaf9f48e41e2
  • grub2-efi-ia32-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:bb5206bde74147f911dd0824ff64cd0dd2697d46cccb6847e07cee55cc02b6be
  • grub2-efi-ia32-cdboot-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:5b72f6fdcf8306c74e467ef61c4efdd3d2a7792690bfa6ad20511be0ab8ca375
  • grub2-efi-ia32-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:23da214ad44f9fc732a90c7128ad24e0eff70b9648a30fa9111f67e352882263
  • grub2-efi-x64-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:f5adbe1e23035a2d5f04031c30bddf7aec66e546e03796194b001392476f0686
  • grub2-efi-x64-cdboot-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:cdf2fe09523471aec44a9c91c48c18e202ddabc7a5a306aa5f8b564a82b6d2db
  • grub2-efi-x64-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:82131bf430caf0f0988a0580924e22693fc993b63263092ab31e0c66483f5403
  • grub2-pc-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:690748ed79a19d9b56b12149cf75845d7e40dfbcfd7cf835e5211880b4e9f615
  • grub2-pc-modules-2.02-106.el8.tuxcare.els10.noarch.rpm
    sha:19c29ca4ccfb8d9f5a664dbbbfdf8c57b1d4612f531c4bff5f3443a2e4c4bf7c
  • grub2-tools-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:23de1b530b87609d3b264ee12842f7cbc384aaab78bb9f9355463434464d8697
  • grub2-tools-efi-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:92d60e527564d75c3b578a910f0d97ece2b635e3c0300036c4e20870c94cf369
  • grub2-tools-extra-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:0bcc09763449fbb0de007182824e008b0c069d9483bb7175d27c186b604a0c8d
  • grub2-tools-minimal-2.02-106.el8.tuxcare.els10.x86_64.rpm
    sha:e1742188600d98927e6246ddacd94110853bd4f615e60f383d0a5b0d624be42c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.