[security-announce] openSUSE-SU-2018:0187-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:0187-1 Rating: important References: #1068032 #1076372 Cross-References: CVE-2017-5715 CVE-2018-2676 CVE-2018-2685 CVE-2018-2686 CVE-2018-2687 CVE-2018-2688 CVE-2018-2689 CVE-2018-2690 CVE-2018-2693 CVE-2018-2694 CVE-2018-2698 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: This update for virtualbox to version 5.1.32 fixes the following issues: The following vulnerabilities were fixed (boo#1076372): - CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, also known as "Spectre", bsc#1068032. - CVE-2018-2676: Local authenticated attacker may gain elevated privileges - CVE-2018-2685: Local authenticated attacker may gain elevated privileges - CVE-2018-2686: Local authenticated attacker may gain elevated privileges - CVE-2018-2687: Local authenticated attacker may gain elevated privileges - CVE-2018-2688: Local authenticated attacker may gain elevated privileges - CVE-2018-2689: Local authenticated attacker may gain elevated privileges - CVE-2018-2690: Local authenticated attacker may gain elevated privileges - CVE-2018-2693: Local authenticated attacker may gain elevated privileges via guest additions - CVE-2018-2694: Local authenticated attacker may gain elevated privileges - CVE-2018-2698: Local authenticated attacker may gain elevated privileges The following bug fixes are included: - fix occasional screen corruption when host screen resolution is changed - increase proposed disk size when creating new VMs for Windows 7 and newer - fix broken communication with certain devices on Linux hosts - Fix problems using 256MB VRAM in raw-mode VMs - add HDA support for more exotic guests (e.g. Haiku) - fix playback with ALSA backend (5.1.28 regression) - fix a problem where OHCI emulation might sporadically drop data transfers Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-75=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2018-75=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (x86_64): python-virtualbox-5.1.32-42.1 python-virtualbox-debuginfo-5.1.32-42.1 virtualbox-5.1.32-42.1 virtualbox-debuginfo-5.1.32-42.1 virtualbox-debugsource-5.1.32-42.1 virtualbox-devel-5.1.32-42.1 virtualbox-guest-kmp-default-5.1.32_k4.4.104_39-42.1 virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1 virtualbox-guest-tools-5.1.32-42.1 virtualbox-guest-tools-debuginfo-5.1.32-42.1 virtualbox-guest-x11-5.1.32-42.1 virtualbox-guest-x11-debuginfo-5.1.32-42.1 virtualbox-host-kmp-default-5.1.32_k4.4.104_39-42.1 virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1 virtualbox-qt-5.1.32-42.1 virtualbox-qt-debuginfo-5.1.32-42.1 virtualbox-vnc-5.1.32-42.1 virtualbox-websrv-5.1.32-42.1 virtualbox-websrv-debuginfo-5.1.32-42.1 - openSUSE Leap 42.3 (noarch): virtualbox-guest-desktop-icons-5.1.32-42.1 virtualbox-guest-source-5.1.32-42.1 virtualbox-host-source-5.1.32-42.1 - openSUSE Leap 42.2 (noarch): virtualbox-guest-desktop-icons-5.1.32-19.49.1 virtualbox-guest-source-5.1.32-19.49.1 virtualbox-host-source-5.1.32-19.49.1 - openSUSE Leap 42.2 (x86_64): python-virtualbox-5.1.32-19.49.1 python-virtualbox-debuginfo-5.1.32-19.49.1 virtualbox-5.1.32-19.49.1 virtualbox-debuginfo-5.1.32-19.49.1 virtualbox-debugsource-5.1.32-19.49.1 virtualbox-devel-5.1.32-19.49.1 virtualbox-guest-kmp-default-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-guest-tools-5.1.32-19.49.1 virtualbox-guest-tools-debuginfo-5.1.32-19.49.1 virtualbox-guest-x11-5.1.32-19.49.1 virtualbox-guest-x11-debuginfo-5.1.32-19.49.1 virtualbox-host-kmp-default-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-qt-5.1.32-19.49.1 virtualbox-qt-debuginfo-5.1.32-19.49.1 virtualbox-vnc-5.1.32-19.49.1 virtualbox-websrv-5.1.32-19.49.1 virtualbox-websrv-debuginfo-5.1.32-19.49.1 References: https://www.suse.com/security/cve/CVE-2017-5715.html https://www.suse.com/security/cve/CVE-2018-2676.html https://www.suse.com/security/cve/CVE-2018-2685.html https://www.suse.com/security/cve/CVE-2018-2686.html https://www.suse.com/security/cve/CVE-2018-2687.html https://www.suse.com/security/cve/CVE-2018-2688.html https://www.suse.com/security/cve/CVE-2018-2689.html https://www.suse.com/security/cve/CVE-2018-2690.html https://www.suse.com/security/cve/CVE-2018-2693.html https://www.suse.com/security/cve/CVE-2018-2694.html https://www.suse.com/security/cve/CVE-2018-2698.html https://bugzilla.suse.com/1068032 https://bugzilla.suse.com/1076372 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org