[CLSA-2026:1771504803] grub2: Fix of CVE-2025-61662
Type:
security
Severity:
Important
Release date:
2026-02-19 12:40:07 UTC
Description:
- CVE-2025-61662: fix use-after-free in gettext/gettext due to unregistered gettext command on module unload
Updated packages:
  • grub2-common-2.06-105.el9_6.tuxcare.1.els1.noarch.rpm
    sha:b59dca23dc5b37cd6289568960a8b217aef72e28f56df674389e8e6f95e49f21
  • grub2-efi-aa64-modules-2.06-105.el9_6.tuxcare.1.els1.noarch.rpm
    sha:860c94d9287436e330a1b37985dcd484b9f8d0c3eede50729e35e890b4f616e2
  • grub2-efi-x64-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:ec170ffb55674874b90756f60aa31cf65befbffa5cbaef37378d7fba92efd30f
  • grub2-efi-x64-cdboot-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:2b1369f0e89703227d18751a5c614061bcdd27d1e10031424a35dfcdcc646ff2
  • grub2-efi-x64-modules-2.06-105.el9_6.tuxcare.1.els1.noarch.rpm
    sha:b550e7e9268170a0eabc7684e562705bda617873668172697cc350f3d7415302
  • grub2-emu-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:762138b13da34f3e119aa06241d91eb05d947bb13afa505740ee933e794859fb
  • grub2-emu-modules-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:d3aa53b1c6d5ab60d9e3bc68298d71f97b600cc85e91be606b7df587a5fccc48
  • grub2-pc-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:204ff5a7ae39de31a6dfb790ed8d620b2108e0789cf2b22432fd1ef0ad5611c7
  • grub2-pc-modules-2.06-105.el9_6.tuxcare.1.els1.noarch.rpm
    sha:d1c6105eb5aaab10a929bdd253e163b33da26df9157e736232023add12436f1c
  • grub2-tools-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:58af49d4b0e57df4ed74b215d4705c5ea70d21b15749529254c9ce1efa6d3fb9
  • grub2-tools-efi-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:38c195fd721e52df788238142d44ab7c5384004e6000389d760f1625242923fb
  • grub2-tools-extra-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:fb22c499e0d25e337c71180e978f1a334dc8b9aa12e692a6e27aaece5cf543bc
  • grub2-tools-minimal-2.06-105.el9_6.tuxcare.1.els1.x86_64.rpm
    sha:0945d11dd3e6bcf8ffcff6f5cc97d2d8f306483000bbfae13abf0f8a665cb1cd
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.