{"id":"MGASA-2015-0480","summary":"Updated grub2 packages fix security vulnerability","details":"A flaw was found in the way the grub2 handled backspace characters entered\nin username and password prompts. An attacker with access to the system\nconsole could use this flaw to bypass grub2 password protection and gain\nadministrative access to the system (CVE-2015-8370).\n","modified":"2026-04-16T06:22:56.231494075Z","published":"2015-12-20T09:15:38Z","upstream":["CVE-2015-8370"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0480.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17334"},{"type":"ADVISORY","url":"http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2015-2623.html"}],"affected":[{"package":{"name":"grub2","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/grub2?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.02-0.git9752.18.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0480.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}