CVE-2025-61662 Affecting grub2-ppc64le package, versions <1:2.02-170.el8_10.1.alma.1


Severity

Recommended
medium

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALMALINUX8-GRUB2PPC64LE-15693312
  • published19 Mar 2026
  • disclosed16 Mar 2026

Introduced: 16 Mar 2026

CVE-2025-61662  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:8 grub2-ppc64le to version 1:2.02-170.el8_10.1.alma.1 or higher.
This issue was patched in ALSA-2026:4648.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2-ppc64le package and not the grub2-ppc64le package as distributed by AlmaLinux. See How to fix? for AlmaLinux:8 relevant fixed versions and status.

A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.

CVSS Base Scores

version 3.1