[security-announce] openSUSE-SU-2018:1057-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:1057-1 Rating: important References: #1089997 Cross-References: CVE-2017-3737 CVE-2017-9798 CVE-2018-0739 CVE-2018-2830 CVE-2018-2831 CVE-2018-2835 CVE-2018-2836 CVE-2018-2837 CVE-2018-2842 CVE-2018-2843 CVE-2018-2844 CVE-2018-2845 CVE-2018-2860 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: This update for VirtualBox to version 5.1.36 fixes multiple issues: Security issues fixed: - CVE-2018-0739: Unauthorized remote attacker may have caused a hang or frequently repeatable crash (complete DOS) - CVE-2018-2830: Attacker with host login may have compromised Virtualbox or further system services after interaction with a third user - CVE-2018-2831: Attacker with host login may have compromised VirtualBox or further system services, allowing read access to some data - CVE-2018-2835: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2836: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2837: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2842: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2843: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2844: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2845: Attacker with host login may have caused a hang or frequently repeatable crash (complete DOS), and perform unauthorized read and write operation to some VirtualBox accessible data - CVE-2018-2860: Privileged attacker may have gained control over VirtualBox and possibly further system services http://www.oracle.com/technetwork/security-advisory/cpuapr2018verbose-36781 08.html http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html #AppendixOVIR This update also contains all upstream fixes and improvements in the stable 5.1.36 release. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-389=1 Package List: - openSUSE Leap 42.3 (noarch): virtualbox-guest-desktop-icons-5.1.36-50.1 virtualbox-guest-source-5.1.36-50.1 virtualbox-host-source-5.1.36-50.1 - openSUSE Leap 42.3 (x86_64): python-virtualbox-5.1.36-50.1 python-virtualbox-debuginfo-5.1.36-50.1 virtualbox-5.1.36-50.1 virtualbox-debuginfo-5.1.36-50.1 virtualbox-debugsource-5.1.36-50.1 virtualbox-devel-5.1.36-50.1 virtualbox-guest-kmp-default-5.1.36_k4.4.126_48-50.1 virtualbox-guest-kmp-default-debuginfo-5.1.36_k4.4.126_48-50.1 virtualbox-guest-tools-5.1.36-50.1 virtualbox-guest-tools-debuginfo-5.1.36-50.1 virtualbox-guest-x11-5.1.36-50.1 virtualbox-guest-x11-debuginfo-5.1.36-50.1 virtualbox-host-kmp-default-5.1.36_k4.4.126_48-50.1 virtualbox-host-kmp-default-debuginfo-5.1.36_k4.4.126_48-50.1 virtualbox-qt-5.1.36-50.1 virtualbox-qt-debuginfo-5.1.36-50.1 virtualbox-vnc-5.1.36-50.1 virtualbox-websrv-5.1.36-50.1 virtualbox-websrv-debuginfo-5.1.36-50.1 References: https://www.suse.com/security/cve/CVE-2017-3737.html https://www.suse.com/security/cve/CVE-2017-9798.html https://www.suse.com/security/cve/CVE-2018-0739.html https://www.suse.com/security/cve/CVE-2018-2830.html https://www.suse.com/security/cve/CVE-2018-2831.html https://www.suse.com/security/cve/CVE-2018-2835.html https://www.suse.com/security/cve/CVE-2018-2836.html https://www.suse.com/security/cve/CVE-2018-2837.html https://www.suse.com/security/cve/CVE-2018-2842.html https://www.suse.com/security/cve/CVE-2018-2843.html https://www.suse.com/security/cve/CVE-2018-2844.html https://www.suse.com/security/cve/CVE-2018-2845.html https://www.suse.com/security/cve/CVE-2018-2860.html https://bugzilla.suse.com/1089997 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org