[security-announce] openSUSE-SU-2019:1547-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:1547-1 Rating: important References: #1122212 Cross-References: CVE-2018-0734 CVE-2018-11763 CVE-2018-11784 CVE-2018-3309 CVE-2019-2446 CVE-2019-2448 CVE-2019-2450 CVE-2019-2451 CVE-2019-2500 CVE-2019-2501 CVE-2019-2504 CVE-2019-2505 CVE-2019-2506 CVE-2019-2508 CVE-2019-2509 CVE-2019-2511 CVE-2019-2520 CVE-2019-2521 CVE-2019-2522 CVE-2019-2523 CVE-2019-2524 CVE-2019-2525 CVE-2019-2526 CVE-2019-2527 CVE-2019-2548 CVE-2019-2552 CVE-2019-2553 CVE-2019-2554 CVE-2019-2555 CVE-2019-2556 Affected Products: openSUSE Leap 15.0 ______________________________________________________________________________ An update that fixes 30 vulnerabilities is now available. Description: This update for virtualbox to version 5.2.24 fixes the following issues: Multiple security issues fixed: CVE-2019-2500, CVE-2019-2524, CVE-2019-2552, CVE-2018-3309, CVE-2019-2520 CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2526, CVE-2019-2548 CVE-2018-11763, CVE-2019-2511, CVE-2019-2508, CVE-2019-2509, CVE-2019-2527 CVE-2019-2450, CVE-2019-2451, CVE-2019-2555, CVE-2019-2554, CVE-2019-2556 CVE-2018-11784, CVE-2018-0734, CVE-2019-2525, CVE-2019-2446, CVE-2019-2448 CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, and CVE-2019-2553 (bsc#1122212). Other issues fixed: - Linux Additions: fix for building vboxvideo on EL 7.6 standard kernel, contributed by Robert Conde - USB: fixed a problem causing failures attaching SuperSpeed devices which report USB version 3.1 (rather than 3.0) on Windows hosts - Audio: added support for surround speaker setups used by Windows 10 Build 1809 - Linux hosts: fixed conflict between Debian and Oracle build desktop files - Linux guests: fixed building drivers on SLES 12.4 - Linux guests: fixed building shared folder driver with older kernels Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-1547=1 Package List: - openSUSE Leap 15.0 (x86_64): python3-virtualbox-5.2.24-lp150.4.33.1 python3-virtualbox-debuginfo-5.2.24-lp150.4.33.1 virtualbox-5.2.24-lp150.4.33.1 virtualbox-debuginfo-5.2.24-lp150.4.33.1 virtualbox-debugsource-5.2.24-lp150.4.33.1 virtualbox-devel-5.2.24-lp150.4.33.1 virtualbox-guest-kmp-default-5.2.24_k4.12.14_lp150.12.61-lp150.4.33.1 virtualbox-guest-kmp-default-debuginfo-5.2.24_k4.12.14_lp150.12.61-lp150.4.33.1 virtualbox-guest-tools-5.2.24-lp150.4.33.1 virtualbox-guest-tools-debuginfo-5.2.24-lp150.4.33.1 virtualbox-guest-x11-5.2.24-lp150.4.33.1 virtualbox-guest-x11-debuginfo-5.2.24-lp150.4.33.1 virtualbox-host-kmp-default-5.2.24_k4.12.14_lp150.12.61-lp150.4.33.1 virtualbox-host-kmp-default-debuginfo-5.2.24_k4.12.14_lp150.12.61-lp150.4.33.1 virtualbox-qt-5.2.24-lp150.4.33.1 virtualbox-qt-debuginfo-5.2.24-lp150.4.33.1 virtualbox-vnc-5.2.24-lp150.4.33.1 virtualbox-websrv-5.2.24-lp150.4.33.1 virtualbox-websrv-debuginfo-5.2.24-lp150.4.33.1 - openSUSE Leap 15.0 (noarch): virtualbox-guest-desktop-icons-5.2.24-lp150.4.33.1 virtualbox-guest-source-5.2.24-lp150.4.33.1 virtualbox-host-source-5.2.24-lp150.4.33.1 References: https://www.suse.com/security/cve/CVE-2018-0734.html https://www.suse.com/security/cve/CVE-2018-11763.html https://www.suse.com/security/cve/CVE-2018-11784.html https://www.suse.com/security/cve/CVE-2018-3309.html https://www.suse.com/security/cve/CVE-2019-2446.html https://www.suse.com/security/cve/CVE-2019-2448.html https://www.suse.com/security/cve/CVE-2019-2450.html https://www.suse.com/security/cve/CVE-2019-2451.html https://www.suse.com/security/cve/CVE-2019-2500.html https://www.suse.com/security/cve/CVE-2019-2501.html https://www.suse.com/security/cve/CVE-2019-2504.html https://www.suse.com/security/cve/CVE-2019-2505.html https://www.suse.com/security/cve/CVE-2019-2506.html https://www.suse.com/security/cve/CVE-2019-2508.html https://www.suse.com/security/cve/CVE-2019-2509.html https://www.suse.com/security/cve/CVE-2019-2511.html https://www.suse.com/security/cve/CVE-2019-2520.html https://www.suse.com/security/cve/CVE-2019-2521.html https://www.suse.com/security/cve/CVE-2019-2522.html https://www.suse.com/security/cve/CVE-2019-2523.html https://www.suse.com/security/cve/CVE-2019-2524.html https://www.suse.com/security/cve/CVE-2019-2525.html https://www.suse.com/security/cve/CVE-2019-2526.html https://www.suse.com/security/cve/CVE-2019-2527.html https://www.suse.com/security/cve/CVE-2019-2548.html https://www.suse.com/security/cve/CVE-2019-2552.html https://www.suse.com/security/cve/CVE-2019-2553.html https://www.suse.com/security/cve/CVE-2019-2554.html https://www.suse.com/security/cve/CVE-2019-2555.html https://www.suse.com/security/cve/CVE-2019-2556.html https://bugzilla.suse.com/1122212 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org