openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0187-1
Rating: important
References: #1068032 #1076372
Cross-References: CVE-2017-5715 CVE-2018-2676 CVE-2018-2685
CVE-2018-2686 CVE-2018-2687 CVE-2018-2688
CVE-2018-2689 CVE-2018-2690 CVE-2018-2693
CVE-2018-2694 CVE-2018-2698
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
This update for virtualbox to version 5.1.32 fixes the following issues:
The following vulnerabilities were fixed (boo#1076372):
– CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized
disclosure of information to an attacker with local user access via a
side-channel analysis, also known as “Spectre”, bsc#1068032.
– CVE-2018-2676: Local authenticated attacker may gain elevated privileges
– CVE-2018-2685: Local authenticated attacker may gain elevated privileges
– CVE-2018-2686: Local authenticated attacker may gain elevated privileges
– CVE-2018-2687: Local authenticated attacker may gain elevated privileges
– CVE-2018-2688: Local authenticated attacker may gain elevated privileges
– CVE-2018-2689: Local authenticated attacker may gain elevated privileges
– CVE-2018-2690: Local authenticated attacker may gain elevated privileges
– CVE-2018-2693: Local authenticated attacker may gain elevated privileges
via guest additions
– CVE-2018-2694: Local authenticated attacker may gain elevated privileges
– CVE-2018-2698: Local authenticated attacker may gain elevated privileges
The following bug fixes are included:
– fix occasional screen corruption when host screen resolution is changed
– increase proposed disk size when creating new VMs for Windows 7 and newer
– fix broken communication with certain devices on Linux hosts
– Fix problems using 256MB VRAM in raw-mode VMs
– add HDA support for more exotic guests (e.g. Haiku)
– fix playback with ALSA backend (5.1.28 regression)
– fix a problem where OHCI emulation might sporadically drop data transfers
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-75=1
– openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-75=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE Leap 42.3 (x86_64):
python-virtualbox-5.1.32-42.1
python-virtualbox-debuginfo-5.1.32-42.1
virtualbox-5.1.32-42.1
virtualbox-debuginfo-5.1.32-42.1
virtualbox-debugsource-5.1.32-42.1
virtualbox-devel-5.1.32-42.1
virtualbox-guest-kmp-default-5.1.32_k4.4.104_39-42.1
virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
virtualbox-guest-tools-5.1.32-42.1
virtualbox-guest-tools-debuginfo-5.1.32-42.1
virtualbox-guest-x11-5.1.32-42.1
virtualbox-guest-x11-debuginfo-5.1.32-42.1
virtualbox-host-kmp-default-5.1.32_k4.4.104_39-42.1
virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
virtualbox-qt-5.1.32-42.1
virtualbox-qt-debuginfo-5.1.32-42.1
virtualbox-vnc-5.1.32-42.1
virtualbox-websrv-5.1.32-42.1
virtualbox-websrv-debuginfo-5.1.32-42.1
– openSUSE Leap 42.3 (noarch):
virtualbox-guest-desktop-icons-5.1.32-42.1
virtualbox-guest-source-5.1.32-42.1
virtualbox-host-source-5.1.32-42.1
– openSUSE Leap 42.2 (noarch):
virtualbox-guest-desktop-icons-5.1.32-19.49.1
virtualbox-guest-source-5.1.32-19.49.1
virtualbox-host-source-5.1.32-19.49.1
– openSUSE Leap 42.2 (x86_64):
python-virtualbox-5.1.32-19.49.1
python-virtualbox-debuginfo-5.1.32-19.49.1
virtualbox-5.1.32-19.49.1
virtualbox-debuginfo-5.1.32-19.49.1
virtualbox-debugsource-5.1.32-19.49.1
virtualbox-devel-5.1.32-19.49.1
virtualbox-guest-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-guest-tools-5.1.32-19.49.1
virtualbox-guest-tools-debuginfo-5.1.32-19.49.1
virtualbox-guest-x11-5.1.32-19.49.1
virtualbox-guest-x11-debuginfo-5.1.32-19.49.1
virtualbox-host-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
virtualbox-qt-5.1.32-19.49.1
virtualbox-qt-debuginfo-5.1.32-19.49.1
virtualbox-vnc-5.1.32-19.49.1
virtualbox-websrv-5.1.32-19.49.1
virtualbox-websrv-debuginfo-5.1.32-19.49.1
References:
https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2018-2676.html
https://www.suse.com/security/cve/CVE-2018-2685.html
https://www.suse.com/security/cve/CVE-2018-2686.html
https://www.suse.com/security/cve/CVE-2018-2687.html
https://www.suse.com/security/cve/CVE-2018-2688.html
https://www.suse.com/security/cve/CVE-2018-2689.html
https://www.suse.com/security/cve/CVE-2018-2690.html
https://www.suse.com/security/cve/CVE-2018-2693.html
https://www.suse.com/security/cve/CVE-2018-2694.html
https://www.suse.com/security/cve/CVE-2018-2698.html
https://bugzilla.suse.com/1068032
https://bugzilla.suse.com/1076372
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org