Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.3160 grub2 security update 17 December 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: grub2 Publisher: Debian Operating System: Debian GNU/Linux 7 Debian GNU/Linux 8 Impact/Access: Administrator Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-8370 Reference: ESB-2015.3141 Original Bulletin: http://www.debian.org/security/2015/dsa-3421 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3421-1 security@debian.org https://www.debian.org/security/ Luciano Bello December 16, 2015 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : grub2 CVE ID : CVE-2015-8370 Debian Bug : 807614 Hector Marco and Ismael Ripoll, from Cybersecurity UPV Research Group, found an integer underflow vulnerability in Grub2, a popular bootloader. A local attacker can bypass the Grub2 authentication by inserting a crafted input as username or password. More information: http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html For the oldstable distribution (wheezy), this problem has been fixed in version 1.99-27+deb7u3. For the stable distribution (jessie), this problem has been fixed in version 2.02~beta2-22+deb8u1. For the unstable distribution (sid), this problem has been fixed in version 2.02~beta2-33. We recommend that you upgrade your grub2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWca2YAAoJEG7C3vaP/jd0dlcP/RhoHne63QfnrnIquCwCZ/QP xaeAcEHt4/4es0+vin1XGBoGQTXN+WcK11sxteoHnrGuI6Wc8JnLbKab/FkvHPKr T/IiXrzqqjbN5LyE1aBRlfucFyIH4t23UEOEalqv5pXuG5Cf3ixVRcapsE2aOP3y 4bz506nn/3wqlnDxQrK1lsLJD1UliT4M4R9r7pAWUm4TAItxamq3f6RQWzhEB4FQ l9mY8pVFQA00V8nrGOrOq50Q2BB8vS/ien+vWns4x34SM1s5CnJtJdqKRoi0CE1n 53+4Q8JgyJv3CEmqXBCfcA5j4lUTErAu2C7voS7UWFpuvTLl/L4b29VvOvBFPdab fXQalh9TPq+SC2U5VIDfz9d+6vNXZrrl9JuEVmJW2obZuDcRuQ46AvMvlIOXliYC rR4Ks6dPVwItaSPPi4zFX1cSqAiIwjNZlOGKDtZMpdOsxQ1S0S4LliAdrDvjFGgi 4z4eX1bj3Rmvt+GEoHax0Hr0rj4NUWeK+eXPHbpREULZk8b5XbX0mHSbyW1FZbiB PUIJVS9x3jEqdCIJgjkQ+0RbF6mgBMebeRJL/jIfUf52GLfxbMsXvcr2syJKdZGm +rP12n+vpZiFSfUbngwnUJYBTT1CNyn3AGJl4QTzbePWXtPQmSAEpeF4okJL7yRL XRbVKamQzx2quRhDq97r =OKnv - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVnIKtH6ZAP0PgtI9AQIQHg//cI/HxyPSomFi6N7rDgNJWjJ1/32rtisw g04J/SeOG3RJ6/UpBEdmKeQ/WrY89bVkVB/7rK1byvnLp75mAEh328OEqfDeoYWx Ff6Vr9q6pwb2u043/5U0Q/yEYPW1rjxmV6qQWSbV9DylgJzC3Y9mQVY3Gx9PE7hb j0xpky2W2iFISBhza+NATO2P1ok7b0bF7Rfiys7k94hy24sA4djP6OQsFem57xQ0 KMORQxRHQo2hlzX7g+/GlKUNqArf/A4WvPU9qUyDotvnfiOgmIZlLZsUHHKlvHhY GYuLptgaY9A9UQfO7mkFUbNQ5cTo6j0nKrVGCSOU4sXlxWGDueqIdHY1IjiOXSGZ MrdZvmdtKuthUb7Qf70DIbJ7uzdYJ87sJVIqw2KErKL8E4Fs4LaC8vgnIBnOxuBE plhPJ+diLtFAd4PfDmWEM5Ub40WPjaoeWa+NGMNTFiawei2hWBnN99nlXNx2X+8D c3cNtLdgunE5lFSJXXZl3/ZjVOH4M/oC2vGXTBLLkYtOSZUfgnfp/6QQjpUFgCYa yyWbbBIFghK88TmAz8lCcC+Ym7tYgms9qJU0xlKSZBbfs2/I5GTMKGHRNhDTWUvj pAe+gobpRZ/sGudb19gy8p6AbDJz3TXMNiZEqwnLEEUzNrm9Ztdz6azCs9kv8+48 0VDrg/IMAlA= =jTfD -----END PGP SIGNATURE-----