You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa VirtualBox

Sigurnosni nedostaci programskog paketa VirtualBox

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201802-01
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: High
Title: VirtualBox: Multiple vulnerabilities
Date: February 11, 2018
Bugs: #644894
ID: 201802-01

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in VirtualBox, the worst of
which could allow an attacker to take control of VirtualBox.

Background
==========

VirtualBox is a powerful virtualization product from Oracle.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 app-emulation/virtualbox
< 5.1.32 >= 5.1.32
2 app-emulation/virtualbox-bin
< 5.1.32.120294 >= 5.1.32.120294
3 app-emulation/virtualbox-guest-additions
< 5.1.32 >= 5.1.32
——————————————————————-
3 affected packages

Description
===========

Multiple vulnerabilities have been discovered in VirtualBox. Please
review the CVE identifiers referenced below for details.

Impact
======

An attacker could take control of VirtualBox resulting in the execution
of arbitrary code with the privileges of the process, a Denial of
Service condition, or other unspecified impacts.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All VirtualBox users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot -v “>=app-emulation/virtualbox-5.1.32”

All VirtualBox Binary users should upgrade to the latest version:

# emerge –sync
# emerge -a -1 -v “>=app-emulation/virtualbox-bin-5.1.32.120294”

All VirtualBox Guest Additions users should upgrade to the latest
version:

# emerge –sync
# emerge -a -1 -v “>=app-emulation/virtualbox-guest-additions-5.1.32”

References
==========

[ 1 ] CVE-2018-2676
https://nvd.nist.gov/vuln/detail/CVE-2018-2676
[ 2 ] CVE-2018-2685
https://nvd.nist.gov/vuln/detail/CVE-2018-2685
[ 3 ] CVE-2018-2686
https://nvd.nist.gov/vuln/detail/CVE-2018-2686
[ 4 ] CVE-2018-2687
https://nvd.nist.gov/vuln/detail/CVE-2018-2687
[ 5 ] CVE-2018-2688
https://nvd.nist.gov/vuln/detail/CVE-2018-2688
[ 6 ] CVE-2018-2689
https://nvd.nist.gov/vuln/detail/CVE-2018-2689
[ 7 ] CVE-2018-2690
https://nvd.nist.gov/vuln/detail/CVE-2018-2690
[ 8 ] CVE-2018-2693
https://nvd.nist.gov/vuln/detail/CVE-2018-2693
[ 9 ] CVE-2018-2694
https://nvd.nist.gov/vuln/detail/CVE-2018-2694
[ 10 ] CVE-2018-2698
https://nvd.nist.gov/vuln/detail/CVE-2018-2698

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201802-01

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=9/Ym
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa exim4

Otkriveni su sigurnosni nedostaci u programskom paketu exim4 za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...

Close