openSUSE-SU-2021:0630-1: important: Security update for virtualbox
openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0630-1
Rating: important
References: #1181197 #1181198 #1183125 #1183329 #1184542
Cross-References: CVE-2021-2074 CVE-2021-2129 CVE-2021-2264
CVSS scores:
CVE-2021-2074 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-2129 (NVD) : 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
CVE-2021-2264 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for virtualbox fixes the following issues:
- Version bump to 6.1.20 (released April 20 2021 by Oracle) Fixes
boo#1183329 "virtualbox 6.1.18 crashes when it runs nested VM" Fixes
boo#1183125 "Leap 15.3 installation in Virtualbox without VBox
integration" Fixes CVE-2021-2264 and boo#1184542. The directory for the
.start files for autostarting VMs is moved from /etc/vbox to
/etc/vbox/autostart.d. In addition, the autostart service is hardened
(by Oracle).
- change the modalias for guest-tools and guest-x11 to get them to
autoinstall.
- Own %{_sysconfdir}/X11/xinit/xinitrc.d as default packages (eg systemd)
no longer do so, breaking package build.
- Update fixes_for_leap15.3 for kernel API changes between 5.3.18-45 and
5.3.18-47.
- update-extpack.sh: explicitly use https:// protocol for authenticity.
The http:// URL is currently redirected to https:// but don't rely on
this.
- Add code to generate guest modules for Leap 15.2 and Leap 15.3. The
kernel versions do not allow window resizing. Files
"virtualbox-kmp-files-leap" and "vboxguestconfig.sh" are added
- Fixes CVE-2021-2074, boo#1181197 and CVE-2021-2129, boo#1181198.
- Under some circumstances, shared folders are mounted as root.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-630=1
Package List:
- openSUSE Leap 15.2 (noarch):
virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1
virtualbox-guest-source-6.1.20-lp152.2.21.1
virtualbox-host-source-6.1.20-lp152.2.21.1
- openSUSE Leap 15.2 (x86_64):
python3-virtualbox-6.1.20-lp152.2.21.1
python3-virtualbox-debuginfo-6.1.20-lp152.2.21.1
virtualbox-6.1.20-lp152.2.21.1
virtualbox-debuginfo-6.1.20-lp152.2.21.1
virtualbox-debugsource-6.1.20-lp152.2.21.1
virtualbox-devel-6.1.20-lp152.2.21.1
virtualbox-guest-tools-6.1.20-lp152.2.21.1
virtualbox-guest-tools-debuginfo-6.1.20-lp152.2.21.1
virtualbox-guest-x11-6.1.20-lp152.2.21.1
virtualbox-guest-x11-debuginfo-6.1.20-lp152.2.21.1
virtualbox-kmp-debugsource-6.1.20-lp152.2.21.1
virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
virtualbox-kmp-default-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
virtualbox-kmp-preempt-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
virtualbox-qt-6.1.20-lp152.2.21.1
virtualbox-qt-debuginfo-6.1.20-lp152.2.21.1
virtualbox-vnc-6.1.20-lp152.2.21.1
virtualbox-websrv-6.1.20-lp152.2.21.1
virtualbox-websrv-debuginfo-6.1.20-lp152.2.21.1
References:
https://www.suse.com/security/cve/CVE-2021-2074.html
https://www.suse.com/security/cve/CVE-2021-2129.html
https://www.suse.com/security/cve/CVE-2021-2264.html
https://bugzilla.suse.com/1181197
https://bugzilla.suse.com/1181198
https://bugzilla.suse.com/1183125
https://bugzilla.suse.com/1183329
https://bugzilla.suse.com/1184542
A virtualbox security update has been released for openSUSE Leap 15.2.