Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-2623

Опубликовано: 15 дек. 2015
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2015-2623: grub2 security and bug fix update (MODERATE)

[2.02-0.33.0.1]

  • Fix comparison in patch for 18504756
  • Remove symlink to grub environment file during uninstall on EFI platforms [bug 19231481]
  • update Oracle Linux certificates (Alexey Petrenko)
  • Put 'with' in menuentry instead of 'using' [bug 18504756]
  • Use different titles for UEK and RHCK kernels [bug 18504756]

[2.02-0.33]

  • Don't remove 01_users, it's the wrong thing to do. Related:rhbz1290089

[2.02-0.32]

  • Rebuild for .z so the release number is different. Related: rhbz#1290089

[2.02-0.31]

  • More work on handling of GRUB2_PASSWORD Resolves: rhbz#1290089

[2.02-0.30]

  • Fix security issue when reading username and password Resolves: CVE-2015-8370
  • Do a better job of handling GRUB_PASSWORD Resolves: rhbz#1290089

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

grub2

2.02-0.33.0.1.el7_2

grub2-efi

2.02-0.33.0.1.el7_2

grub2-efi-modules

2.02-0.33.0.1.el7_2

grub2-tools

2.02-0.33.0.1.el7_2

Связанные CVE

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

redhat
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

CVSS3: 7.4
nvd
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.4
debian
больше 9 лет назад

Multiple integer underflows in Grub2 1.98 through 2.02 allow physicall ...