openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:1400-1 Rating: moderate References: #925663 #935900 #938408 Cross-References: CVE-2015-2594 CVE-2015-3456 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: - Version bump to 4.2.32 bnc#938408 CVE-2015-2594 * Storage: fixed a crash when taking snapshots (4.2.30 regression) * ExtPack: don't fail if the TMP directory contains non-latin1 characters (bug #14159) * Main: implemented dedicated event processing queue * Linux hosts: fixed a bug which made the netfilter driver ignore certain events (bug #12264) Also included from Version bump to 4.2.30 bnc#935900 CVE-2015-3456: * Various small fixes here and there - Fix the multiinstall on kernel modules to avoid conflicts bnc#925663 - Drop smap.diff fails to apply to the latest release Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-550=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-550=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): python-virtualbox-4.3.30-17.1 python-virtualbox-debuginfo-4.3.30-17.1 virtualbox-4.3.30-17.1 virtualbox-debuginfo-4.3.30-17.1 virtualbox-debugsource-4.3.30-17.1 virtualbox-devel-4.3.30-17.1 virtualbox-guest-kmp-default-4.3.30_k3.16.7_21-17.1 virtualbox-guest-kmp-default-debuginfo-4.3.30_k3.16.7_21-17.1 virtualbox-guest-kmp-desktop-4.3.30_k3.16.7_21-17.1 virtualbox-guest-kmp-desktop-debuginfo-4.3.30_k3.16.7_21-17.1 virtualbox-guest-tools-4.3.30-17.1 virtualbox-guest-tools-debuginfo-4.3.30-17.1 virtualbox-guest-x11-4.3.30-17.1 virtualbox-guest-x11-debuginfo-4.3.30-17.1 virtualbox-host-kmp-default-4.3.30_k3.16.7_21-17.1 virtualbox-host-kmp-default-debuginfo-4.3.30_k3.16.7_21-17.1 virtualbox-host-kmp-desktop-4.3.30_k3.16.7_21-17.1 virtualbox-host-kmp-desktop-debuginfo-4.3.30_k3.16.7_21-17.1 virtualbox-qt-4.3.30-17.1 virtualbox-qt-debuginfo-4.3.30-17.1 virtualbox-websrv-4.3.30-17.1 virtualbox-websrv-debuginfo-4.3.30-17.1 - openSUSE 13.2 (noarch): virtualbox-guest-desktop-icons-4.3.30-17.1 virtualbox-host-source-4.3.30-17.1 - openSUSE 13.2 (i586): virtualbox-guest-kmp-pae-4.3.30_k3.16.7_21-17.1 virtualbox-guest-kmp-pae-debuginfo-4.3.30_k3.16.7_21-17.1 virtualbox-host-kmp-pae-4.3.30_k3.16.7_21-17.1 virtualbox-host-kmp-pae-debuginfo-4.3.30_k3.16.7_21-17.1 - openSUSE 13.1 (i586 x86_64): python-virtualbox-4.2.32-2.35.1 python-virtualbox-debuginfo-4.2.32-2.35.1 virtualbox-4.2.32-2.35.1 virtualbox-debuginfo-4.2.32-2.35.1 virtualbox-debugsource-4.2.32-2.35.1 virtualbox-devel-4.2.32-2.35.1 virtualbox-guest-kmp-default-4.2.32_k3.11.10_29-2.35.1 virtualbox-guest-kmp-default-debuginfo-4.2.32_k3.11.10_29-2.35.1 virtualbox-guest-kmp-desktop-4.2.32_k3.11.10_29-2.35.1 virtualbox-guest-kmp-desktop-debuginfo-4.2.32_k3.11.10_29-2.35.1 virtualbox-guest-tools-4.2.32-2.35.1 virtualbox-guest-tools-debuginfo-4.2.32-2.35.1 virtualbox-guest-x11-4.2.32-2.35.1 virtualbox-guest-x11-debuginfo-4.2.32-2.35.1 virtualbox-host-kmp-default-4.2.32_k3.11.10_29-2.35.1 virtualbox-host-kmp-default-debuginfo-4.2.32_k3.11.10_29-2.35.1 virtualbox-host-kmp-desktop-4.2.32_k3.11.10_29-2.35.1 virtualbox-host-kmp-desktop-debuginfo-4.2.32_k3.11.10_29-2.35.1 virtualbox-qt-4.2.32-2.35.1 virtualbox-qt-debuginfo-4.2.32-2.35.1 virtualbox-websrv-4.2.32-2.35.1 virtualbox-websrv-debuginfo-4.2.32-2.35.1 - openSUSE 13.1 (noarch): virtualbox-host-source-4.2.32-2.35.1 - openSUSE 13.1 (i586): virtualbox-guest-kmp-pae-4.2.32_k3.11.10_29-2.35.1 virtualbox-guest-kmp-pae-debuginfo-4.2.32_k3.11.10_29-2.35.1 virtualbox-host-kmp-pae-4.2.32_k3.11.10_29-2.35.1 virtualbox-host-kmp-pae-debuginfo-4.2.32_k3.11.10_29-2.35.1 References: https://www.suse.com/security/cve/CVE-2015-2594.html https://www.suse.com/security/cve/CVE-2015-3456.html https://bugzilla.suse.com/925663 https://bugzilla.suse.com/935900 https://bugzilla.suse.com/938408