SUSE 5149 Published by

A virtualbox security update has been released for openSUSE Leap 15.3.



openSUSE-SU-2021:1393-1: important: Security update for virtualbox


openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID: openSUSE-SU-2021:1393-1
Rating: important
References: #1191104 #1191526 #1191869
Cross-References: CVE-2021-2475 CVE-2021-35538 CVE-2021-35540
CVE-2021-35542 CVE-2021-35545
CVSS scores:
CVE-2021-2475 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2021-35538 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-35540 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-35542 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2021-35545 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H

Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for virtualbox fixes the following issues:

Version bump to 6.1.28 (released October 19 2021 by Oracle)

This is a maintenance release. The following items were fixed and/or added:

- VMM: Fixed guru meditation while booting nested-guests accessing debug
registers under certain conditions
- UI: Bug fixes for touchpad-based scrolling
- VMSVGA: Fixed VM black screen issue on first resize after restoring from
saved state (bug #20067)
- VMSVGA: Fixed display corruption on Linux Mint (bug #20513)
- Storage: Fixed a possible write error under certain circumstances when
using VHD images (bug #20512)
- Network: Multiple updates in virtio-net device support
- Network: Disconnecting cable in saved VM state now is handled properly
by virtio-net
- Network: More administrative control over network ranges, see user manual
- NAT: Fixed not rejecting TFTP requests with absolute pathnames (bug
#20589)
- Audio: Fixed VM session aborting after PC hibernation (bug #20516)
- Audio: Fixed setting the line-in volume of the HDA emulation on modern
Linux guests
- Audio: Fixed resuming playback of the AC'97 emulation while a snapshot
has been taken
- API: Added bindings support for Python 3.9 (bug #20252)
- API: Fixed rare hang of VM when changing settings at runtime
- Linux host: Improved kernel modules installation detection which
prevents unnecessary modules rebuild
- Host Services: Shared Clipboard: Prevent guest clipboard reset when
clipboard sharing is disabled (bug #20487)
- Host Services: Shared Clipboard over VRDP: Fixed to continue working
when guest service reconnects to host (bug #20366)
- Host Services: Shared Clipboard over VRDP: Fixed preventing remote RDP
client to hang when guest has no clipboard data to report
- Linux Host and Guest: Introduced initial support for kernels 5.14 and
5.15
- Linux Host and Guest: Introduced initial support for RHEL 8.5 kernel
- Windows Guest: Introduced Windows 11 guest support, including unattended
installation
- Fixes CVE-2021-35538, CVE-2021-35545, CVE-2021-35540, CVE-2021-35542,
and CVE-2021-2475 (boo#1191869)

- Use kernel_module_directory macro for kernel modules (boo#1191526)
- Finish UsrMerge for VirtualBox components (boo#1191104).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-2021-1393=1


Package List:

- openSUSE Leap 15.3 (noarch):

virtualbox-guest-desktop-icons-6.1.28-lp153.2.12.1
virtualbox-guest-source-6.1.28-lp153.2.12.1
virtualbox-host-source-6.1.28-lp153.2.12.1

- openSUSE Leap 15.3 (x86_64):

python3-virtualbox-6.1.28-lp153.2.12.1
python3-virtualbox-debuginfo-6.1.28-lp153.2.12.1
virtualbox-6.1.28-lp153.2.12.1
virtualbox-debuginfo-6.1.28-lp153.2.12.1
virtualbox-debugsource-6.1.28-lp153.2.12.1
virtualbox-devel-6.1.28-lp153.2.12.1
virtualbox-guest-tools-6.1.28-lp153.2.12.1
virtualbox-guest-tools-debuginfo-6.1.28-lp153.2.12.1
virtualbox-guest-x11-6.1.28-lp153.2.12.1
virtualbox-guest-x11-debuginfo-6.1.28-lp153.2.12.1
virtualbox-kmp-debugsource-6.1.28-lp153.2.12.1
virtualbox-kmp-default-6.1.28_k5.3.18_59.27-lp153.2.12.1
virtualbox-kmp-default-debuginfo-6.1.28_k5.3.18_59.27-lp153.2.12.1
virtualbox-kmp-preempt-6.1.28_k5.3.18_59.27-lp153.2.12.1
virtualbox-kmp-preempt-debuginfo-6.1.28_k5.3.18_59.27-lp153.2.12.1
virtualbox-qt-6.1.28-lp153.2.12.1
virtualbox-qt-debuginfo-6.1.28-lp153.2.12.1
virtualbox-vnc-6.1.28-lp153.2.12.1
virtualbox-websrv-6.1.28-lp153.2.12.1
virtualbox-websrv-debuginfo-6.1.28-lp153.2.12.1

References:

  https://www.suse.com/security/cve/CVE-2021-2475.html
  https://www.suse.com/security/cve/CVE-2021-35538.html
  https://www.suse.com/security/cve/CVE-2021-35540.html
  https://www.suse.com/security/cve/CVE-2021-35542.html
  https://www.suse.com/security/cve/CVE-2021-35545.html
  https://bugzilla.suse.com/1191104
  https://bugzilla.suse.com/1191526
  https://bugzilla.suse.com/1191869