Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:2784 - Security Advisory
Issued:
2025-03-13
Updated:
2025-03-13

RHSA-2025:2784 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: grub2 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for grub2 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

  • grub2: net: Out-of-bounds write in grub_net_search_config_file() (CVE-2025-0624)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64

Fixes

  • BZ - 2346112 - CVE-2025-0624 grub2: net: Out-of-bounds write in grub_net_search_config_file()

CVEs

  • CVE-2025-0624

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 8.2

SRPM
grub2-2.02-87.el8_2.13.src.rpm SHA-256: d21bd40fbd509ddd69388565123ae70dcc88c78ee39968f7d0c9bc95d3af9ffd
x86_64
grub2-common-2.02-87.el8_2.13.noarch.rpm SHA-256: 86ff88187d98d2f45244254aafeb71ffdd7538719a608001891df8cad2a30923
grub2-debuginfo-2.02-87.el8_2.13.x86_64.rpm SHA-256: 008590d4a9112f792606b4c491d7c78872db39260fc4fbbde0aae49eda3818d9
grub2-debugsource-2.02-87.el8_2.13.x86_64.rpm SHA-256: c05bc4a48f132221ddb318f2cd6e4c8b633c2f128cff9d0a4dc57b981e7016f4
grub2-efi-aa64-modules-2.02-87.el8_2.13.noarch.rpm SHA-256: 0a499b08e4616ca4bd857d40ca4a90ac08e8f8b036136748025f18e375ea7ed0
grub2-efi-ia32-2.02-87.el8_2.13.x86_64.rpm SHA-256: 149439f1bdcf668e5ca5336d76d419924826de9f8c88c7f9eb5bab0bfd11d3cb
grub2-efi-ia32-cdboot-2.02-87.el8_2.13.x86_64.rpm SHA-256: 77146f27de85d9361539e1f2fa5cdc071661caad4b497c986aaad7a2602366e7
grub2-efi-ia32-modules-2.02-87.el8_2.13.noarch.rpm SHA-256: c72b936aa56be309c912c85c183dc289491ca4d3a7ef56470f022f5b8173c96a
grub2-efi-x64-2.02-87.el8_2.13.x86_64.rpm SHA-256: 79c72e7b4f0bd0766c704498d817254dbe9c46fd58e7f8d22b6380159ae85fff
grub2-efi-x64-cdboot-2.02-87.el8_2.13.x86_64.rpm SHA-256: b0f8a695c0fee2d2d3f54b4c5507553aa8b2d4ae7446b29ebe634940d5df72a1
grub2-efi-x64-modules-2.02-87.el8_2.13.noarch.rpm SHA-256: 0e45b95cd6fce1da02ffb3a0b2ef2b9628e1f881a0378948e3971bd090c93bae
grub2-pc-2.02-87.el8_2.13.x86_64.rpm SHA-256: 982570d8ab2e63ab7061bc1e4ce487a6aaa658c251a4e2a8565191a300a7a81b
grub2-pc-modules-2.02-87.el8_2.13.noarch.rpm SHA-256: 4bbcf982b9bce43b1e54eace5943f5848f3b72b22030ed788056f3eeba60f8fa
grub2-ppc64le-modules-2.02-87.el8_2.13.noarch.rpm SHA-256: 84835d2fa42f8dd1651ac4be42dd17df2c48a4dc37fc1e725c0ce73a17c3c949
grub2-tools-2.02-87.el8_2.13.x86_64.rpm SHA-256: 327dd1f175382365b217d9a04bb7d87982fccdb01ac4b17e9bdb6841b7ccf5fd
grub2-tools-debuginfo-2.02-87.el8_2.13.x86_64.rpm SHA-256: a7dec9fbaae34dc7b6d973fc9d0feca60ac72717fa985756170cf26da13d91a7
grub2-tools-efi-2.02-87.el8_2.13.x86_64.rpm SHA-256: c142eb0d4803ad53fe8b7266eada510c287d88f0d40da590cbfb267e6bcab1cf
grub2-tools-efi-debuginfo-2.02-87.el8_2.13.x86_64.rpm SHA-256: 9b200e1d88ff3abc25e1926032f742159692742b5ff4eb416d60a2ef39b140c1
grub2-tools-extra-2.02-87.el8_2.13.x86_64.rpm SHA-256: 46fc02ac35ac14f0935907a8e9b87b67ebb933ce37678e4aee59fb365b8ca8b1
grub2-tools-extra-debuginfo-2.02-87.el8_2.13.x86_64.rpm SHA-256: 8655c71d773d56a40838642f68f96ceee74a7186c417698636ab55e96116d283
grub2-tools-minimal-2.02-87.el8_2.13.x86_64.rpm SHA-256: 32da3ae1d06f99028e8a4c5b8a599fe94434d9a163861d0a18c74111f9954d58
grub2-tools-minimal-debuginfo-2.02-87.el8_2.13.x86_64.rpm SHA-256: 1c9f5cc7a8a31b80b881d13c94552d75826459c967525a38443691f35b51e034

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility