openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:0187-1
Rating:             important
References:         #1068032 #1076372 
Cross-References:   CVE-2017-5715 CVE-2018-2676 CVE-2018-2685
                    CVE-2018-2686 CVE-2018-2687 CVE-2018-2688
                    CVE-2018-2689 CVE-2018-2690 CVE-2018-2693
                    CVE-2018-2694 CVE-2018-2698
Affected Products:
                    openSUSE Leap 42.3
                    openSUSE Leap 42.2
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:

   This update for virtualbox to version 5.1.32 fixes the following issues:

   The following vulnerabilities were fixed (boo#1076372):

   - CVE-2017-5715: Systems with microprocessors utilizing speculative
     execution and indirect branch prediction may allow unauthorized
     disclosure of information to an attacker with local user access via a
     side-channel analysis, also known as "Spectre", bsc#1068032.
   - CVE-2018-2676: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2685: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2686: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2687: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2688: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2689: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2690: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2693: Local authenticated attacker may gain elevated privileges
     via guest additions
   - CVE-2018-2694: Local authenticated attacker may gain elevated privileges
   - CVE-2018-2698: Local authenticated attacker may gain elevated privileges

   The following bug fixes are included:

   - fix occasional screen corruption when host screen resolution is changed
   - increase proposed disk size when creating new VMs for Windows 7 and newer
   - fix broken communication with certain devices on Linux hosts
   - Fix problems using 256MB VRAM in raw-mode VMs
   - add HDA support for more exotic guests (e.g. Haiku)
   - fix playback with ALSA backend (5.1.28 regression)
   - fix a problem where OHCI emulation might sporadically drop data transfers

Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-75=1

   - openSUSE Leap 42.2:

      zypper in -t patch openSUSE-2018-75=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.3 (x86_64):

      python-virtualbox-5.1.32-42.1
      python-virtualbox-debuginfo-5.1.32-42.1
      virtualbox-5.1.32-42.1
      virtualbox-debuginfo-5.1.32-42.1
      virtualbox-debugsource-5.1.32-42.1
      virtualbox-devel-5.1.32-42.1
      virtualbox-guest-kmp-default-5.1.32_k4.4.104_39-42.1
      virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
      virtualbox-guest-tools-5.1.32-42.1
      virtualbox-guest-tools-debuginfo-5.1.32-42.1
      virtualbox-guest-x11-5.1.32-42.1
      virtualbox-guest-x11-debuginfo-5.1.32-42.1
      virtualbox-host-kmp-default-5.1.32_k4.4.104_39-42.1
      virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1
      virtualbox-qt-5.1.32-42.1
      virtualbox-qt-debuginfo-5.1.32-42.1
      virtualbox-vnc-5.1.32-42.1
      virtualbox-websrv-5.1.32-42.1
      virtualbox-websrv-debuginfo-5.1.32-42.1

   - openSUSE Leap 42.3 (noarch):

      virtualbox-guest-desktop-icons-5.1.32-42.1
      virtualbox-guest-source-5.1.32-42.1
      virtualbox-host-source-5.1.32-42.1

   - openSUSE Leap 42.2 (noarch):

      virtualbox-guest-desktop-icons-5.1.32-19.49.1
      virtualbox-guest-source-5.1.32-19.49.1
      virtualbox-host-source-5.1.32-19.49.1

   - openSUSE Leap 42.2 (x86_64):

      python-virtualbox-5.1.32-19.49.1
      python-virtualbox-debuginfo-5.1.32-19.49.1
      virtualbox-5.1.32-19.49.1
      virtualbox-debuginfo-5.1.32-19.49.1
      virtualbox-debugsource-5.1.32-19.49.1
      virtualbox-devel-5.1.32-19.49.1
      virtualbox-guest-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
      virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
      virtualbox-guest-tools-5.1.32-19.49.1
      virtualbox-guest-tools-debuginfo-5.1.32-19.49.1
      virtualbox-guest-x11-5.1.32-19.49.1
      virtualbox-guest-x11-debuginfo-5.1.32-19.49.1
      virtualbox-host-kmp-default-5.1.32_k4.4.104_18.44-19.49.1
      virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1
      virtualbox-qt-5.1.32-19.49.1
      virtualbox-qt-debuginfo-5.1.32-19.49.1
      virtualbox-vnc-5.1.32-19.49.1
      virtualbox-websrv-5.1.32-19.49.1
      virtualbox-websrv-debuginfo-5.1.32-19.49.1


References:

   https://www.suse.com/security/cve/CVE-2017-5715.html
   https://www.suse.com/security/cve/CVE-2018-2676.html
   https://www.suse.com/security/cve/CVE-2018-2685.html
   https://www.suse.com/security/cve/CVE-2018-2686.html
   https://www.suse.com/security/cve/CVE-2018-2687.html
   https://www.suse.com/security/cve/CVE-2018-2688.html
   https://www.suse.com/security/cve/CVE-2018-2689.html
   https://www.suse.com/security/cve/CVE-2018-2690.html
   https://www.suse.com/security/cve/CVE-2018-2693.html
   https://www.suse.com/security/cve/CVE-2018-2694.html
   https://www.suse.com/security/cve/CVE-2018-2698.html
   https://bugzilla.suse.com/1068032
   https://bugzilla.suse.com/1076372

-- 

openSUSE: 2018:0187-1: important: virtualbox

January 24, 2018
An update that fixes 11 vulnerabilities is now available.

Description

This update for virtualbox to version 5.1.32 fixes the following issues: The following vulnerabilities were fixed (boo#1076372): - CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, also known as "Spectre", bsc#1068032. - CVE-2018-2676: Local authenticated attacker may gain elevated privileges - CVE-2018-2685: Local authenticated attacker may gain elevated privileges - CVE-2018-2686: Local authenticated attacker may gain elevated privileges - CVE-2018-2687: Local authenticated attacker may gain elevated privileges - CVE-2018-2688: Local authenticated attacker may gain elevated privileges - CVE-2018-2689: Local authenticated attacker may gain elevated privileges - CVE-2018-2690: Local authenticated attacker may gain elevated privileges - CVE-2018-2693: Local authenticated attacker may gain elevated privileges via guest additions - CVE-2018-2694: Local authenticated attacker may gain elevated privileges - CVE-2018-2698: Local authenticated attacker may gain elevated privileges The following bug fixes are included: - fix occasional screen corruption when host screen resolution is changed - increase proposed disk size when creating new VMs for Windows 7 and newer - fix broken communication with certain devices on Linux hosts - Fix problems using 256MB VRAM in raw-mode VMs - add HDA support for more exotic guests (e.g. Haiku) - fix playback with ALSA backend (5.1.28 regression) - fix a problem where OHCI emulation might sporadically drop data transfers

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-75=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2018-75=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Leap 42.3 (x86_64): python-virtualbox-5.1.32-42.1 python-virtualbox-debuginfo-5.1.32-42.1 virtualbox-5.1.32-42.1 virtualbox-debuginfo-5.1.32-42.1 virtualbox-debugsource-5.1.32-42.1 virtualbox-devel-5.1.32-42.1 virtualbox-guest-kmp-default-5.1.32_k4.4.104_39-42.1 virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1 virtualbox-guest-tools-5.1.32-42.1 virtualbox-guest-tools-debuginfo-5.1.32-42.1 virtualbox-guest-x11-5.1.32-42.1 virtualbox-guest-x11-debuginfo-5.1.32-42.1 virtualbox-host-kmp-default-5.1.32_k4.4.104_39-42.1 virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_39-42.1 virtualbox-qt-5.1.32-42.1 virtualbox-qt-debuginfo-5.1.32-42.1 virtualbox-vnc-5.1.32-42.1 virtualbox-websrv-5.1.32-42.1 virtualbox-websrv-debuginfo-5.1.32-42.1 - openSUSE Leap 42.3 (noarch): virtualbox-guest-desktop-icons-5.1.32-42.1 virtualbox-guest-source-5.1.32-42.1 virtualbox-host-source-5.1.32-42.1 - openSUSE Leap 42.2 (noarch): virtualbox-guest-desktop-icons-5.1.32-19.49.1 virtualbox-guest-source-5.1.32-19.49.1 virtualbox-host-source-5.1.32-19.49.1 - openSUSE Leap 42.2 (x86_64): python-virtualbox-5.1.32-19.49.1 python-virtualbox-debuginfo-5.1.32-19.49.1 virtualbox-5.1.32-19.49.1 virtualbox-debuginfo-5.1.32-19.49.1 virtualbox-debugsource-5.1.32-19.49.1 virtualbox-devel-5.1.32-19.49.1 virtualbox-guest-kmp-default-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-guest-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-guest-tools-5.1.32-19.49.1 virtualbox-guest-tools-debuginfo-5.1.32-19.49.1 virtualbox-guest-x11-5.1.32-19.49.1 virtualbox-guest-x11-debuginfo-5.1.32-19.49.1 virtualbox-host-kmp-default-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-host-kmp-default-debuginfo-5.1.32_k4.4.104_18.44-19.49.1 virtualbox-qt-5.1.32-19.49.1 virtualbox-qt-debuginfo-5.1.32-19.49.1 virtualbox-vnc-5.1.32-19.49.1 virtualbox-websrv-5.1.32-19.49.1 virtualbox-websrv-debuginfo-5.1.32-19.49.1


References

https://www.suse.com/security/cve/CVE-2017-5715.html https://www.suse.com/security/cve/CVE-2018-2676.html https://www.suse.com/security/cve/CVE-2018-2685.html https://www.suse.com/security/cve/CVE-2018-2686.html https://www.suse.com/security/cve/CVE-2018-2687.html https://www.suse.com/security/cve/CVE-2018-2688.html https://www.suse.com/security/cve/CVE-2018-2689.html https://www.suse.com/security/cve/CVE-2018-2690.html https://www.suse.com/security/cve/CVE-2018-2693.html https://www.suse.com/security/cve/CVE-2018-2694.html https://www.suse.com/security/cve/CVE-2018-2698.html https://bugzilla.suse.com/1068032 https://bugzilla.suse.com/1076372--


Severity
Announcement ID: openSUSE-SU-2018:0187-1
Rating: important
Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2

Related News