openSUSE-SU-2022:10129-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:10129-1 Rating: important References: #1201720 #1203086 #1203306 #1203370 Cross-References: CVE-2022-21554 CVE-2022-21571 CVSS scores: CVE-2022-21554 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVE-2022-21554 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVE-2022-21571 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2022-21571 (SUSE): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for virtualbox fixes the following issues: Version bump to 6.1.38r86 released by Oracle September 02 2022 This is a maintenance release. The following items were fixed and/or added: - GUI: Improvements in Native Language Support area - Main: OVF Export: Added support for exporting VMs containing Virtio-SCSI controllers - Recording settings: Fixed a regression which could cause not starting the COM server (VBoxSVC) under certain circumstances (bug #21034) - Recording: More deterministic naming for recorded files (will now overwrite old .webm files if present) - Linux Host and Guest Additions installer: Improved check for systemd presence in the system (bug #19033) - Linux Guest Additions: Introduced initial support for kernel 6.0 - Linux Guest Additions: Additional fixes for kernel RHEL 9.1 (bug #21065) - Windows Guest Additions: Improvements in Drag and Drop area - Fixes permission problem with /dev/vboxuser (boo#1203370) - Fixes missing firewall opening (boo#1203086) - Fixes boo#1201720 CVE items for CVE-2022-21571, CVE-2022-21554 Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-2022-10129=1 Package List: - openSUSE Leap 15.3 (x86_64): python3-virtualbox-6.1.38-lp153.2.36.1 python3-virtualbox-debuginfo-6.1.38-lp153.2.36.1 virtualbox-6.1.38-lp153.2.36.1 virtualbox-debuginfo-6.1.38-lp153.2.36.1 virtualbox-debugsource-6.1.38-lp153.2.36.1 virtualbox-devel-6.1.38-lp153.2.36.1 virtualbox-guest-tools-6.1.38-lp153.2.36.1 virtualbox-guest-tools-debuginfo-6.1.38-lp153.2.36.1 virtualbox-kmp-debugsource-6.1.38-lp153.2.36.1 virtualbox-kmp-default-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 virtualbox-kmp-default-debuginfo-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 virtualbox-kmp-preempt-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 virtualbox-kmp-preempt-debuginfo-6.1.38_k5.3.18_150300.59.93-lp153.2.36.1 virtualbox-qt-6.1.38-lp153.2.36.1 virtualbox-qt-debuginfo-6.1.38-lp153.2.36.1 virtualbox-vnc-6.1.38-lp153.2.36.1 virtualbox-websrv-6.1.38-lp153.2.36.1 virtualbox-websrv-debuginfo-6.1.38-lp153.2.36.1 - openSUSE Leap 15.3 (noarch): virtualbox-guest-desktop-icons-6.1.38-lp153.2.36.1 virtualbox-guest-source-6.1.38-lp153.2.36.1 virtualbox-host-source-6.1.38-lp153.2.36.1 References: https://www.suse.com/security/cve/CVE-2022-21554.html https://www.suse.com/security/cve/CVE-2022-21571.html https://bugzilla.suse.com/1201720 https://bugzilla.suse.com/1203086 https://bugzilla.suse.com/1203306 https://bugzilla.suse.com/1203370
participants (1)
-
opensuse-security@opensuse.org