openSUSE-SU-2012:1323-1: virtualbox: update to 4.1.22 stable release
openSUSE Security Update: virtualbox: update to 4.1.22 stable release ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:1323-1 Rating: low References: #737525 #742115 #743143 #761923 #780711 Cross-References: CVE-2011-3571 CVE-2012-0105 CVE-2012-0111 Affected Products: openSUSE 12.2 openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. Description: VirtualBox was updated to 4.1.22 stable release, bringing lots of security and also bugfixes. The 4.1.22 release is brought to all openSUSE distributions to align their versions. changes in virtualbox 4.1.22 (maintenance release) * VMM: fixed a potential host crash triggered by shutting down a VM when another VM was running * VMM: fixed a potential host crash under a high guest memory pressure (seen with Windows 8 guests) * VMM: respect RAM preallocation while restoring saved state. * VMM: fixed handling of task gates if VT-x/AMD-V is disabled * Storage: fixed audio CD passthrough for certain media players * USB: don't crash if a USB device is plugged or unplugged when saving or loading the VM state (SMP guests only) * RTC: fixed a potential corruption of CMOS bank 1 * Mac OS X hosts: installer fixes for Leopard (4.1.20 regression) * Windows Additions: fixed memory leak in VBoxTray (bug #10808) - changes in virtualbox 4.1.20 (maintenance release) * VMM: fixed a crash under rare circumstances for VMs running without hardware virtualization * VMM: fixed a code analysis bug for certain displacement instructions for VMs running without hardware virtualization * VMM: fixed an interpretion bug for TPR read instructions under rare conditions (AMD-V only) * Snapshots: fixed a crash when restoring an old snapshot when powering off a VM (bugs #9604, #10491) * VBoxSVC: be more tolerant against environment variables with strange encodings (bug #8780) * VGA: fixed wrong access check which might cause a crash under certain conditions * NAT: final fix for crashes under rare conditions (bug #10513) * Virtio-net: fixed the problem with receiving of GSO packets in Windows XP guests causing packet loss in host-to-VM transfers * HPET: several fixes (bugs #10170, #10306) * Clipboard: disable the clipboard by default for new VMs * BIOS: the PCI BIOS was not properly detected with the chipset type set to ICH9 (bugs #9301, #10327) * Mac OS X hosts: adaptions to Mountain Lion * Linux Installer: fixes for Gentoo Linux (bug #10642) * Linux guests: fixed mouse integration on Fedora 17 guests (bug #2306) * Linux Additions: compile fixes for RHEL/CentOS 6.3 (bug #10756) * Linux Additions: compile fixes for Linux 3.5-rc1 and Linux 3.6-rc1 (bug #10709) * Solaris host: fixed a guru meditation while allocating large pages (bug #10600) * Solaris host: fixed possible kernel panics while freeing memory * Solaris Installer: fixed missing icon for menu and desktop shortcuts Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2012-696 - openSUSE 12.1: zypper in -t patch openSUSE-2012-696 - openSUSE 11.4: zypper in -t patch openSUSE-2012-696 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.2 (i586 x86_64): python-virtualbox-4.1.22-1.6.1 python-virtualbox-debuginfo-4.1.22-1.6.1 virtualbox-4.1.22-1.6.1 virtualbox-debuginfo-4.1.22-1.6.1 virtualbox-debugsource-4.1.22-1.6.1 virtualbox-devel-4.1.22-1.6.1 virtualbox-guest-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-guest-kmp-default-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-guest-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-guest-kmp-desktop-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-guest-tools-4.1.22-1.6.1 virtualbox-guest-tools-debuginfo-4.1.22-1.6.1 virtualbox-guest-x11-4.1.22-1.6.1 virtualbox-guest-x11-debuginfo-4.1.22-1.6.1 virtualbox-host-kmp-default-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-host-kmp-default-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-host-kmp-desktop-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-host-kmp-desktop-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-qt-4.1.22-1.6.1 virtualbox-qt-debuginfo-4.1.22-1.6.1 virtualbox-websrv-4.1.22-1.6.1 virtualbox-websrv-debuginfo-4.1.22-1.6.1 - openSUSE 12.2 (i586): virtualbox-guest-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-guest-kmp-pae-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-host-kmp-pae-4.1.22_k3.4.6_2.10-1.6.1 virtualbox-host-kmp-pae-debuginfo-4.1.22_k3.4.6_2.10-1.6.1 - openSUSE 12.1 (i586 x86_64): python-virtualbox-4.1.22-3.5.1 python-virtualbox-debuginfo-4.1.22-3.5.1 virtualbox-4.1.22-3.5.1 virtualbox-debuginfo-4.1.22-3.5.1 virtualbox-debugsource-4.1.22-3.5.1 virtualbox-devel-4.1.22-3.5.1 virtualbox-guest-kmp-default-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-guest-kmp-default-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-guest-kmp-desktop-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-guest-kmp-desktop-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-guest-tools-4.1.22-3.5.1 virtualbox-guest-tools-debuginfo-4.1.22-3.5.1 virtualbox-guest-x11-4.1.22-3.5.1 virtualbox-guest-x11-debuginfo-4.1.22-3.5.1 virtualbox-host-kmp-default-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-host-kmp-default-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-host-kmp-desktop-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-host-kmp-desktop-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-qt-4.1.22-3.5.1 virtualbox-qt-debuginfo-4.1.22-3.5.1 - openSUSE 12.1 (i586): virtualbox-guest-kmp-pae-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-guest-kmp-pae-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-host-kmp-pae-4.1.22_k3.1.10_1.16-3.5.1 virtualbox-host-kmp-pae-debuginfo-4.1.22_k3.1.10_1.16-3.5.1 - openSUSE 11.4 (i586 x86_64): python-virtualbox-4.0.12-0.48.1 python-virtualbox-debuginfo-4.0.12-0.48.1 virtualbox-4.0.12-0.48.1 virtualbox-debuginfo-4.0.12-0.48.1 virtualbox-debugsource-4.0.12-0.48.1 virtualbox-devel-4.0.12-0.48.1 virtualbox-guest-kmp-default-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-guest-kmp-default-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-guest-kmp-desktop-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-guest-kmp-desktop-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-guest-tools-4.0.12-0.48.1 virtualbox-guest-tools-debuginfo-4.0.12-0.48.1 virtualbox-guest-x11-4.0.12-0.48.1 virtualbox-guest-x11-debuginfo-4.0.12-0.48.1 virtualbox-host-kmp-default-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-host-kmp-default-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-host-kmp-desktop-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-host-kmp-desktop-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-qt-4.0.12-0.48.1 virtualbox-qt-debuginfo-4.0.12-0.48.1 - openSUSE 11.4 (i586): virtualbox-guest-kmp-pae-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-guest-kmp-pae-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-host-kmp-pae-4.0.12_k2.6.37.6_0.20-0.48.1 virtualbox-host-kmp-pae-debuginfo-4.0.12_k2.6.37.6_0.20-0.48.1 References: http://support.novell.com/security/cve/CVE-2011-3571.html http://support.novell.com/security/cve/CVE-2012-0105.html http://support.novell.com/security/cve/CVE-2012-0111.html https://bugzilla.novell.com/737525 https://bugzilla.novell.com/742115 https://bugzilla.novell.com/743143 https://bugzilla.novell.com/761923 https://bugzilla.novell.com/780711
participants (1)
-
opensuse-security@opensuse.org