openSUSE-SU-2021:0630-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:0630-1 Rating: important References: #1181197 #1181198 #1183125 #1183329 #1184542 Cross-References: CVE-2021-2074 CVE-2021-2129 CVE-2021-2264 CVSS scores: CVE-2021-2074 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2021-2129 (NVD) : 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N CVE-2021-2264 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. Description: This update for virtualbox fixes the following issues: - Version bump to 6.1.20 (released April 20 2021 by Oracle) Fixes boo#1183329 "virtualbox 6.1.18 crashes when it runs nested VM" Fixes boo#1183125 "Leap 15.3 installation in Virtualbox without VBox integration" Fixes CVE-2021-2264 and boo#1184542. The directory for the <user>.start files for autostarting VMs is moved from /etc/vbox to /etc/vbox/autostart.d. In addition, the autostart service is hardened (by Oracle). - change the modalias for guest-tools and guest-x11 to get them to autoinstall. - Own %{_sysconfdir}/X11/xinit/xinitrc.d as default packages (eg systemd) no longer do so, breaking package build. - Update fixes_for_leap15.3 for kernel API changes between 5.3.18-45 and 5.3.18-47. - update-extpack.sh: explicitly use https:// protocol for authenticity. The http:// URL is currently redirected to https:// but don't rely on this. - Add code to generate guest modules for Leap 15.2 and Leap 15.3. The kernel versions do not allow window resizing. Files "virtualbox-kmp-files-leap" and "vboxguestconfig.sh" are added - Fixes CVE-2021-2074, boo#1181197 and CVE-2021-2129, boo#1181198. - Under some circumstances, shared folders are mounted as root. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-630=1 Package List: - openSUSE Leap 15.2 (noarch): virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1 virtualbox-guest-source-6.1.20-lp152.2.21.1 virtualbox-host-source-6.1.20-lp152.2.21.1 - openSUSE Leap 15.2 (x86_64): python3-virtualbox-6.1.20-lp152.2.21.1 python3-virtualbox-debuginfo-6.1.20-lp152.2.21.1 virtualbox-6.1.20-lp152.2.21.1 virtualbox-debuginfo-6.1.20-lp152.2.21.1 virtualbox-debugsource-6.1.20-lp152.2.21.1 virtualbox-devel-6.1.20-lp152.2.21.1 virtualbox-guest-tools-6.1.20-lp152.2.21.1 virtualbox-guest-tools-debuginfo-6.1.20-lp152.2.21.1 virtualbox-guest-x11-6.1.20-lp152.2.21.1 virtualbox-guest-x11-debuginfo-6.1.20-lp152.2.21.1 virtualbox-kmp-debugsource-6.1.20-lp152.2.21.1 virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-default-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-preempt-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-qt-6.1.20-lp152.2.21.1 virtualbox-qt-debuginfo-6.1.20-lp152.2.21.1 virtualbox-vnc-6.1.20-lp152.2.21.1 virtualbox-websrv-6.1.20-lp152.2.21.1 virtualbox-websrv-debuginfo-6.1.20-lp152.2.21.1 References: https://www.suse.com/security/cve/CVE-2021-2074.html https://www.suse.com/security/cve/CVE-2021-2129.html https://www.suse.com/security/cve/CVE-2021-2264.html https://bugzilla.suse.com/1181197 https://bugzilla.suse.com/1181198 https://bugzilla.suse.com/1183125 https://bugzilla.suse.com/1183329 https://bugzilla.suse.com/1184542
participants (1)
-
opensuse-security@opensuse.org