Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in VirtualBox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in VirtualBox
ID: openSUSE-SU-2018:0187-1
Distribution: SUSE
Plattformen: SUSE openSUSE Leap 42.2, SUSE openSUSE Leap 42.3
Datum: Mi, 24. Januar 2018, 06:16
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2689
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2676
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2698
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2694
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2690
Applikationen: VirtualBox

Originalnachricht

   openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:0187-1
Rating: important
References: #1068032 #1076372
Cross-References: CVE-2017-5715 CVE-2018-2676 CVE-2018-2685
CVE-2018-2686 CVE-2018-2687 CVE-2018-2688
CVE-2018-2689 CVE-2018-2690 CVE-2018-2693
CVE-2018-2694 CVE-2018-2698
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 11 vulnerabilities is now available.

Description:

This update for virtualbox to version 5.1.32 fixes the following issues:

The following vulnerabilities were fixed (boo#1076372):

- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure of information to an attacker with local user access via a
side-channel analysis, also known as "Spectre", bsc#1068032.
- CVE-2018-2676: Local authenticated attacker may gain elevated privileges
- CVE-2018-2685: Local authenticated attacker may gain elevated privileges
- CVE-2018-2686: Local authenticated attacker may gain elevated privileges
- CVE-2018-2687: Local authenticated attacker may gain elevated privileges
- CVE-2018-2688: Local authenticated attacker may gain elevated privileges
- CVE-2018-2689: Local authenticated attacker may gain elevated privileges
- CVE-2018-2690: Local authenticated attacker may gain elevated privileges
- CVE-2018-2693: Local authenticated attacker may gain elevated privileges
via guest additions
- CVE-2018-2694: Local authenticated attacker may gain elevated privileges
- CVE-2018-2698: Local authenticated attacker may gain elevated privileges

The following bug fixes are included:

- fix occasional screen corruption when host screen resolution is changed
- increase proposed disk size when creating new VMs for Windows 7 and newer
- fix broken communication with certain devices on Linux hosts
- Fix problems using 256MB VRAM in raw-mode VMs
- add HDA support for more exotic guests (e.g. Haiku)
- fix playback with ALSA backend (5.1.28 regression)
- fix a problem where OHCI emulation might sporadically drop data transfers


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-75=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2018-75=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (x86_64):

python-virtualbox-5.1.32-42.1
python-virtualbox-debuginfo-5.1.32-42.1
virtualbox-5.1.32-42.1
virtualbox-debuginfo-5.1.32-42.1
virtualbox-debugsource-5.1.32-42.1
virtualbox-devel-5.1.32-42.1
virtualbox-guest-kmp-default-5.1.32_k4.4.104_39-42.1
virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
virtualbox-guest-tools-5.1.32-42.1
virtualbox-guest-tools-debuginfo-5.1.32-42.1
virtualbox-guest-x11-5.1.32-42.1
virtualbox-guest-x11-debuginfo-5.1.32-42.1
virtualbox-host-kmp-default-5.1.32_k4.4.104_39-42.1
virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
virtualbox-qt-5.1.32-42.1
virtualbox-qt-debuginfo-5.1.32-42.1
virtualbox-vnc-5.1.32-42.1
virtualbox-websrv-5.1.32-42.1
virtualbox-websrv-debuginfo-5.1.32-42.1

- openSUSE Leap 42.3 (noarch):

virtualbox-guest-desktop-icons-5.1.32-42.1
virtualbox-guest-source-5.1.32-42.1
virtualbox-host-source-5.1.32-42.1

- openSUSE Leap 42.2 (noarch):

virtualbox-guest-desktop-icons-5.1.32-19.49.1
virtualbox-guest-source-5.1.32-19.49.1
virtualbox-host-source-5.1.32-19.49.1

- openSUSE Leap 42.2 (x86_64):

python-virtualbox-5.1.32-19.49.1
python-virtualbox-debuginfo-5.1.32-19.49.1
virtualbox-5.1.32-19.49.1
virtualbox-debuginfo-5.1.32-19.49.1
virtualbox-debugsource-5.1.32-19.49.1
virtualbox-devel-5.1.32-19.49.1
virtualbox-guest-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-guest-tools-5.1.32-19.49.1
virtualbox-guest-tools-debuginfo-5.1.32-19.49.1
virtualbox-guest-x11-5.1.32-19.49.1
virtualbox-guest-x11-debuginfo-5.1.32-19.49.1
virtualbox-host-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-qt-5.1.32-19.49.1
virtualbox-qt-debuginfo-5.1.32-19.49.1
virtualbox-vnc-5.1.32-19.49.1
virtualbox-websrv-5.1.32-19.49.1
virtualbox-websrv-debuginfo-5.1.32-19.49.1


References:

https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-2676.html
https://www.suse.com/security/cve/CVE-2018-2685.html
https://www.suse.com/security/cve/CVE-2018-2686.html
https://www.suse.com/security/cve/CVE-2018-2687.html
https://www.suse.com/security/cve/CVE-2018-2688.html
https://www.suse.com/security/cve/CVE-2018-2689.html
https://www.suse.com/security/cve/CVE-2018-2690.html
https://www.suse.com/security/cve/CVE-2018-2693.html
https://www.suse.com/security/cve/CVE-2018-2694.html
https://www.suse.com/security/cve/CVE-2018-2698.html
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1076372

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung