openSUSE: 2020:0925-1: moderate: Virtualbox

    Date 03 Jul 2020
    163
    Posted By LinuxSecurity Advisories
    An update that fixes 19 vulnerabilities is now available.
       openSUSE Security Update: Security update for Virtualbox
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2020:0925-1
    Rating:             moderate
    References:         #1169628 
    Cross-References:   CVE-2020-2741 CVE-2020-2742 CVE-2020-2743
                        CVE-2020-2748 CVE-2020-2758 CVE-2020-2894
                        CVE-2020-2902 CVE-2020-2905 CVE-2020-2907
                        CVE-2020-2908 CVE-2020-2909 CVE-2020-2910
                        CVE-2020-2911 CVE-2020-2913 CVE-2020-2914
                        CVE-2020-2929 CVE-2020-2951 CVE-2020-2958
                        CVE-2020-2959
    Affected Products:
                        openSUSE Leap 15.1
    ______________________________________________________________________________
    
       An update that fixes 19 vulnerabilities is now available.
    
    Description:
    
    
       Virtualbox was updated to 6.0.22 (released May 15 2020 by Oracle)
    
       This is a maintenance release. The following items were fixed and/or added:
    
       Guest Additions: Build problems fix with Oracle Linux 8.2 (Red Hat
       compatible kernel) / Red Hat Enterprise Linux 8.2 / CentOS 8.2 (bug
       #19391) Guest Control/VBoxManage: fix handling of multiple environment
       variables supplied to 'VBoxManage guestcontrol VM run' (6.1.6/6.0.20
       regression; bug #19518)
    
       Version bump to 6.0.20 (released April 14 2020 by Oracle)
    
       This is a maintenance release. The following items were fixed and/or added:
    
       - USB: Multiple enhancements improving prformance and stability
       - VBoxManage: Multiple fixes for guestcontrol command
       - Graphics: Enhancements in 2D and 3D acceleration and rendering
       - API: Fix for exception handling bug in Python bindings
       - Linux host and guest: Support Linux kernel 5.6 (bug #19312)
    
       This update fixes the following security issues: CVE-2020-2741,
       CVE-2020-2742, CVE-2020-2743, CVE-2020-2748, CVE-2020-2758, CVE-2020-2894,
       CVE-2020-2902, CVE-2020-2905, CVE-2020-2907, CVE-2020-2908, CVE-2020-2909,
       CVE-2020-2910, CVE-2020-2911, CVE-2020-2913, CVE-2020-2914, CVE-2020-2929,
       CVE-2020-2951, CVE-2020-2958, CVE-2020-2959 (bsc#1169628)
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.1:
    
          zypper in -t patch openSUSE-2020-925=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.1 (noarch):
    
          virtualbox-guest-desktop-icons-6.0.22-lp151.2.15.1
          virtualbox-guest-source-6.0.22-lp151.2.15.1
          virtualbox-host-source-6.0.22-lp151.2.15.1
    
       - openSUSE Leap 15.1 (x86_64):
    
          python3-virtualbox-6.0.22-lp151.2.15.1
          python3-virtualbox-debuginfo-6.0.22-lp151.2.15.1
          virtualbox-6.0.22-lp151.2.15.1
          virtualbox-debuginfo-6.0.22-lp151.2.15.1
          virtualbox-debugsource-6.0.22-lp151.2.15.1
          virtualbox-devel-6.0.22-lp151.2.15.1
          virtualbox-guest-tools-6.0.22-lp151.2.15.1
          virtualbox-guest-tools-debuginfo-6.0.22-lp151.2.15.1
          virtualbox-guest-x11-6.0.22-lp151.2.15.1
          virtualbox-guest-x11-debuginfo-6.0.22-lp151.2.15.1
          virtualbox-kmp-default-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1
          virtualbox-kmp-default-debuginfo-6.0.22_k4.12.14_lp151.28.52-lp151.2.15.1
          virtualbox-qt-6.0.22-lp151.2.15.1
          virtualbox-qt-debuginfo-6.0.22-lp151.2.15.1
          virtualbox-vnc-6.0.22-lp151.2.15.1
          virtualbox-websrv-6.0.22-lp151.2.15.1
          virtualbox-websrv-debuginfo-6.0.22-lp151.2.15.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-2741.html
       https://www.suse.com/security/cve/CVE-2020-2742.html
       https://www.suse.com/security/cve/CVE-2020-2743.html
       https://www.suse.com/security/cve/CVE-2020-2748.html
       https://www.suse.com/security/cve/CVE-2020-2758.html
       https://www.suse.com/security/cve/CVE-2020-2894.html
       https://www.suse.com/security/cve/CVE-2020-2902.html
       https://www.suse.com/security/cve/CVE-2020-2905.html
       https://www.suse.com/security/cve/CVE-2020-2907.html
       https://www.suse.com/security/cve/CVE-2020-2908.html
       https://www.suse.com/security/cve/CVE-2020-2909.html
       https://www.suse.com/security/cve/CVE-2020-2910.html
       https://www.suse.com/security/cve/CVE-2020-2911.html
       https://www.suse.com/security/cve/CVE-2020-2913.html
       https://www.suse.com/security/cve/CVE-2020-2914.html
       https://www.suse.com/security/cve/CVE-2020-2929.html
       https://www.suse.com/security/cve/CVE-2020-2951.html
       https://www.suse.com/security/cve/CVE-2020-2958.html
       https://www.suse.com/security/cve/CVE-2020-2959.html
       https://bugzilla.suse.com/1169628
    
    -- 
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":60.87,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":39.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.