CVE-2015-8370

NameCVE-2015-8370
DescriptionMultiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-368-1, DSA-3421-1
Debian Bugs807614

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
grub2 (PTS)buster2.06-3~deb10u1fixed
buster (security)2.06-3~deb10u4fixed
bullseye (security), bullseye2.06-3~deb11u6fixed
bookworm, bookworm (security)2.06-13+deb12u1fixed
sid, trixie2.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
grub2sourcesqueeze1.98+20100804-14+squeeze2DLA-368-1
grub2sourcewheezy1.99-27+deb7u3DSA-3421-1
grub2sourcejessie2.02~beta2-22+deb8u1DSA-3421-1
grub2source(unstable)2.02~beta2-33807614

Notes

https://twitter.com/lostinsecurity/status/674925944524640257
http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

Search for package or bug name: Reporting problems