openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:0084-1
Rating: important
References: #1122212
Cross-References: CVE-2018-0734 CVE-2018-11763 CVE-2018-11784
CVE-2018-3309 CVE-2019-2446 CVE-2019-2448
CVE-2019-2450 CVE-2019-2451 CVE-2019-2500
CVE-2019-2501 CVE-2019-2504 CVE-2019-2505
CVE-2019-2506 CVE-2019-2508 CVE-2019-2509
CVE-2019-2511 CVE-2019-2520 CVE-2019-2521
CVE-2019-2522 CVE-2019-2523 CVE-2019-2524
CVE-2019-2525 CVE-2019-2526 CVE-2019-2527
CVE-2019-2548 CVE-2019-2552 CVE-2019-2553
CVE-2019-2554 CVE-2019-2555 CVE-2019-2556
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 30 vulnerabilities is now available.
Description:
This update for virtualbox version 5.2.24 fixes the following issues:
Update fixes multiple vulnerabilities:
CVE-2019-2500, CVE-2019-2524, CVE-2019-2552, CVE-2018-3309,
CVE-2019-2520 CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2526,
CVE-2019-2548 CVE-2018-11763, CVE-2019-2511, CVE-2019-2508, CVE-2019-2509,
CVE-2019-2527 CVE-2019-2450, CVE-2019-2451, CVE-2019-2555, CVE-2019-2554,
CVE-2019-2556 CVE-2018-11784, CVE-2018-0734, CVE-2019-2525, CVE-2019-2446,
CVE-2019-2448 CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506,
and CVE-2019-2553 (boo#1122212).
Non-security issues fixed:
– Linux Additions: fix for building vboxvideo on EL 7.6 standard kernel,
contributed by Robert Conde
– USB: fixed a problem causing failures attaching SuperSpeed devices which
report USB version 3.1 (rather than 3.0) on Windows hosts
– Audio: added support for surround speaker setups used by Windows 10
Build 1809
– Linux hosts: fixed conflict between Debian and Oracle build desktop files
– Linux guests: fixed building drivers on SLES 12.4
– Linux guests: fixed building shared folder driver with older kernels
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-84=1
Package List:
– openSUSE Leap 42.3 (noarch):
virtualbox-guest-desktop-icons-5.2.24-66.1
virtualbox-guest-source-5.2.24-66.1
virtualbox-host-source-5.2.24-66.1
– openSUSE Leap 42.3 (x86_64):
python-virtualbox-5.2.24-66.1
python-virtualbox-debuginfo-5.2.24-66.1
virtualbox-5.2.24-66.1
virtualbox-debuginfo-5.2.24-66.1
virtualbox-debugsource-5.2.24-66.1
virtualbox-devel-5.2.24-66.1
virtualbox-guest-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-guest-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-guest-tools-5.2.24-66.1
virtualbox-guest-tools-debuginfo-5.2.24-66.1
virtualbox-guest-x11-5.2.24-66.1
virtualbox-guest-x11-debuginfo-5.2.24-66.1
virtualbox-host-kmp-default-5.2.24_k4.4.165_81-66.1
virtualbox-host-kmp-default-debuginfo-5.2.24_k4.4.165_81-66.1
virtualbox-qt-5.2.24-66.1
virtualbox-qt-debuginfo-5.2.24-66.1
virtualbox-vnc-5.2.24-66.1
virtualbox-websrv-5.2.24-66.1
virtualbox-websrv-debuginfo-5.2.24-66.1
References:
https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-11763.html
https://www.suse.com/security/cve/CVE-2018-11784.html
https://www.suse.com/security/cve/CVE-2018-3309.html
https://www.suse.com/security/cve/CVE-2019-2446.html
https://www.suse.com/security/cve/CVE-2019-2448.html
https://www.suse.com/security/cve/CVE-2019-2450.html
https://www.suse.com/security/cve/CVE-2019-2451.html
https://www.suse.com/security/cve/CVE-2019-2500.html
https://www.suse.com/security/cve/CVE-2019-2501.html
https://www.suse.com/security/cve/CVE-2019-2504.html
https://www.suse.com/security/cve/CVE-2019-2505.html
https://www.suse.com/security/cve/CVE-2019-2506.html
https://www.suse.com/security/cve/CVE-2019-2508.html
https://www.suse.com/security/cve/CVE-2019-2509.html
https://www.suse.com/security/cve/CVE-2019-2511.html
https://www.suse.com/security/cve/CVE-2019-2520.html
https://www.suse.com/security/cve/CVE-2019-2521.html
https://www.suse.com/security/cve/CVE-2019-2522.html
https://www.suse.com/security/cve/CVE-2019-2523.html
https://www.suse.com/security/cve/CVE-2019-2524.html
https://www.suse.com/security/cve/CVE-2019-2525.html
https://www.suse.com/security/cve/CVE-2019-2526.html
https://www.suse.com/security/cve/CVE-2019-2527.html
https://www.suse.com/security/cve/CVE-2019-2548.html
https://www.suse.com/security/cve/CVE-2019-2552.html
https://www.suse.com/security/cve/CVE-2019-2553.html
https://www.suse.com/security/cve/CVE-2019-2554.html
https://www.suse.com/security/cve/CVE-2019-2555.html
https://www.suse.com/security/cve/CVE-2019-2556.html
https://bugzilla.suse.com/1122212
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org