{"affected":[{"ecosystem_specific":{"binaries":[{"grub2":"2.12-slfo.1.1_2.1","grub2-arm64-efi":"2.12-slfo.1.1_2.1","grub2-i386-pc":"2.12-slfo.1.1_2.1","grub2-powerpc-ieee1275":"2.12-slfo.1.1_2.1","grub2-s390x-emu":"2.12-slfo.1.1_2.1","grub2-snapper-plugin":"2.12-slfo.1.1_2.1","grub2-x86_64-efi":"2.12-slfo.1.1_2.1","grub2-x86_64-xen":"2.12-slfo.1.1_2.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"grub2","purl":"pkg:rpm/suse/grub2&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.12-slfo.1.1_2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for grub2 fixes the following issues:\n\n- Fix error: /boot/grub2/x86_64-efi/bli.mod not found (bsc#1231591)\n\n- Fix OOM error in loading loopback file (bsc#1230840) (bsc#1249140)\n\n- Update the patch to fix \"SRK not matched\" errors when unsealing\n  the key (bsc#1232411) (bsc#1247242)\n\nSecurity fixes for 2024:\n\n- Bump upstream SBAT generation to 5\n\n- CVE-2024-45774: Fixed heap overflows in JPEG parser (bsc#1233609)\n- CVE-2024-45775: Fixed missing NULL check in extcmd parser (bsc#1233610)\n- CVE-2024-45776: Fixed overflow in .MO file (gettext) handling (bsc#1233612)\n- CVE-2024-45777: Fixed integer overflow in gettext (bsc#1233613)\n- CVE-2024-45778: Fixed bfs filesystem not fuzzing stable (bsc#1233606)\n- CVE-2024-45779: Fixed bfs heap overflow (bsc#1233608)\n- CVE-2024-45780: Fixed overflow in tar/cpio (bsc#1233614)\n- CVE-2024-45781: Fixed ufs strcpy overflow(bsc#1233617)\n- CVE-2024-45782: Fixed hfs strcpy overflow (bsc#1233615)\n- CVE-2024-45783: Fixed hfsplus refcount overflow (bsc#1233616)\n- CVE-2024-49504: Fixed bypassing TPM-bound disk encryption on SL(E)M\n  encrypted Images (bsc#1229163) (bsc#1229164)\n- CVE-2024-56737: Fixed heap-based buffer overflow in fs/hfs.c via\n  crafted sblock data in an HFS filesystem (bsc#1234958)\n- CVE-2024-56738: Fixed side-channel attack due to not constant-time\n  algorithm in grub_crypto_memcmp (bsc#1234959)\n- CVE-2025-0622: Fixed command/gpg use-after-free due to hooks not being\n  removed on module unload (bsc#1236317)\n- CVE-2025-0624: Fixed net Out-of-bounds write in grub_net_search_config_file() (bsc#1236316)\n- CVE-2025-0677: Fixed UFS integer overflow may lead to heap based\n  out-of-bounds write when handling symlinks (bsc#1237002)\n- CVE-2025-0678: Fixed squash4 Integer overflow may lead to heap based\n  out-of-bounds write when reading data (bsc#1237006)\n- CVE-2025-0684: Fixed reiserfs Integer overflow when handling symlinks\n  may lead to heap based out-of-bounds write when reading data (bsc#1237008)\n- CVE-2025-0685: Fixed jfs Integer overflow when handling symlinks may\n  lead to heap based out-of-bounds write when reading data (bsc#1237009)\n- CVE-2025-0686: Fixed romfs Integer overflow when handling symlinks\n  may lead to heap based out-of-bounds write when reading data (bsc#1237010)\n- CVE-2025-0689: Fixed udf heap based buffer overflow  in\n  grub_udf_read_block() may lead to arbitrary code execution (bsc#1237011)\n- CVE-2025-0690: Fixed \"read\" integer overflow may lead to out-of-bounds write (bsc#1237012)\n- CVE-2025-1118: Fixed commands/dump The dump command is not in lockdown when secure boot is enabled (bsc#1237013)\n- CVE-2025-1125: Fixed fs/hfs interger overflow may lead to heap based out-of-bounds write (bsc#1237014)\n- CVE-2025-4382: Fixed TPM auto-decryption data exposure (bsc#1242971)\n- Restrict CLI access if the encrypted root device is automatically unlocked by\n  the TPM. LUKS password authentication is required for access to be granted\n","id":"SUSE-SU-2025:20863-1","modified":"2025-10-17T12:04:21Z","published":"2025-10-17T12:04:21Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520863-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237014"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242971"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0622"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0624"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-0690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-1118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-1125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4382"}],"related":["CVE-2024-45774","CVE-2024-45775","CVE-2024-45776","CVE-2024-45777","CVE-2024-45778","CVE-2024-45779","CVE-2024-45780","CVE-2024-45781","CVE-2024-45782","CVE-2024-45783","CVE-2024-49504","CVE-2024-56737","CVE-2024-56738","CVE-2025-0622","CVE-2025-0624","CVE-2025-0677","CVE-2025-0678","CVE-2025-0684","CVE-2025-0685","CVE-2025-0686","CVE-2025-0689","CVE-2025-0690","CVE-2025-1118","CVE-2025-1125","CVE-2025-4382"],"summary":"Security update for grub2","upstream":["CVE-2024-45774","CVE-2024-45775","CVE-2024-45776","CVE-2024-45777","CVE-2024-45778","CVE-2024-45779","CVE-2024-45780","CVE-2024-45781","CVE-2024-45782","CVE-2024-45783","CVE-2024-49504","CVE-2024-56737","CVE-2024-56738","CVE-2025-0622","CVE-2025-0624","CVE-2025-0677","CVE-2025-0678","CVE-2025-0684","CVE-2025-0685","CVE-2025-0686","CVE-2025-0689","CVE-2025-0690","CVE-2025-1118","CVE-2025-1125","CVE-2025-4382"]}