Mageia 2021-0385: virtualbox security update

Advisories

MGASA-2021-0385 - Updated virtualbox packages fix security vulnerability

Publication date: 27 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0385.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-2409,
     CVE-2021-2442,
     CVE-2021-2443,
     CVE-2021-2454

This update provides the upstream 6.1.24 maintenance release that fixes
atleast the following security vulnerabilities:

An easily exploitable vulnerability in the Oracle VM VirtualBox (component:
Core) prior to 6.1.24 allows high privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM
VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may
significantly impact additional products. Successful attacks of this
vulnerability can result in takeover of Oracle VM VirtualBox (CVE-2021-2409).

An easily exploitable vulnerability in the Oracle VM VirtualBox (component:
Core) prior to 6.1.24 allows high privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM
VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may
significantly impact additional products. Successful attacks of this
vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of Oracle VM VirtualBox
(CVE-2021-2442).

An easily exploitable vulnerability in the Oracle VM VirtualBox (component:
Core) prior to 6.1.24 allows high privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM
VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may
significantly impact additional products. Successful attacks of this
vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well
as unauthorized update, insert or delete access to some of Oracle VM
VirtualBox accessible data and unauthorized read access to a subset of
Oracle VM VirtualBox accessible data (CVE-2021-2443).

An difficult to exploit vulnerability in the Oracle VM VirtualBox (component:
Core) prior to 6.1.24 allows low privileged attacker with logon to the
infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM
VirtualBox. Successful attacks of this vulnerability can result in takeover
of Oracle VM VirtualBox (CVE-2021-2454).

For other upstream fixes in this update, see the referenced changelog.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29279
- https://www.oracle.com/security-alerts/cpujul2021.html#AppendixOVIR
- https://www.virtualbox.org/wiki/Changelog-6.1#v24
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2409
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2442
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2443
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2454

SRPMS:
- 8/core/virtualbox-6.1.24-1.mga8
- 8/core/kmod-virtualbox-6.1.24-1.1.mga8

Mageia 2021-0385: virtualbox security update

Summary

This update provides the upstream 6.1.24 maintenance release that fixes atleast the following security vulnerabilities:
An easily exploitable vulnerability in the Oracle VM VirtualBox (component: Core) prior to 6.1.24 allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox (CVE-2021-2409).
An easily exploitable vulnerability in the Oracle VM VirtualBox (component: Core) prior to 6.1.24 allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox (CVE-2021-2442).
An easily exploitable vulnerability in the Oracle VM VirtualBox (component: Core) prior to 6.1.24 allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data (CVE-2021-2443).
An difficult to exploit vulnerability in the Oracle VM VirtualBox (component: Core) prior to 6.1.24 allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox (CVE-2021-2454).
For other upstream fixes in this update, see the referenced changelog.

References

- https://bugs.mageia.org/show_bug.cgi?id=29279

- https://www.oracle.com/security-alerts/cpujul2021.html#AppendixOVIR

- https://www.virtualbox.org/wiki/Changelog-6.1#v24

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2409

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2442

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2443

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2454

Resolution

MGASA-2021-0385 - Updated virtualbox packages fix security vulnerability

SRPMS

- 8/core/virtualbox-6.1.24-1.mga8

- 8/core/kmod-virtualbox-6.1.24-1.1.mga8

Severity
Publication date: 27 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0385.html
Type: security
CVE: CVE-2021-2409, CVE-2021-2442, CVE-2021-2443, CVE-2021-2454

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.