openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0630-1
Rating:             important
References:         #1181197 #1181198 #1183125 #1183329 #1184542 
                    
Cross-References:   CVE-2021-2074 CVE-2021-2129 CVE-2021-2264
                   
CVSS scores:
                    CVE-2021-2074 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
                    CVE-2021-2129 (NVD) : 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
                    CVE-2021-2264 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that solves three vulnerabilities and has two
   fixes is now available.

Description:

   This update for virtualbox fixes the following issues:

   - Version bump to 6.1.20 (released April 20 2021 by Oracle) Fixes
     boo#1183329 "virtualbox 6.1.18 crashes when it runs nested VM" Fixes
     boo#1183125 "Leap 15.3 installation in Virtualbox without VBox
     integration" Fixes CVE-2021-2264 and boo#1184542. The directory for the
     .start files for autostarting VMs is moved from /etc/vbox to
     /etc/vbox/autostart.d. In addition, the autostart service is hardened
     (by Oracle).
   -  change the modalias for guest-tools and guest-x11 to get them to
      autoinstall.
   - Own %{_sysconfdir}/X11/xinit/xinitrc.d as default packages (eg systemd)
     no longer do so, breaking package build.
   - Update fixes_for_leap15.3 for kernel API changes between 5.3.18-45 and
     5.3.18-47.
   - update-extpack.sh: explicitly use https:// protocol for authenticity.
     The https:// URL is currently redirected to https:// but don't rely on
     this.
   - Add code to generate guest modules for Leap 15.2 and Leap 15.3. The
     kernel versions do not allow window resizing. Files
     "virtualbox-kmp-files-leap" and "vboxguestconfig.sh" are added
   - Fixes CVE-2021-2074, boo#1181197 and CVE-2021-2129, boo#1181198.
   - Under some circumstances, shared folders are mounted as root.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-630=1



Package List:

   - openSUSE Leap 15.2 (noarch):

      virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1
      virtualbox-guest-source-6.1.20-lp152.2.21.1
      virtualbox-host-source-6.1.20-lp152.2.21.1

   - openSUSE Leap 15.2 (x86_64):

      python3-virtualbox-6.1.20-lp152.2.21.1
      python3-virtualbox-debuginfo-6.1.20-lp152.2.21.1
      virtualbox-6.1.20-lp152.2.21.1
      virtualbox-debuginfo-6.1.20-lp152.2.21.1
      virtualbox-debugsource-6.1.20-lp152.2.21.1
      virtualbox-devel-6.1.20-lp152.2.21.1
      virtualbox-guest-tools-6.1.20-lp152.2.21.1
      virtualbox-guest-tools-debuginfo-6.1.20-lp152.2.21.1
      virtualbox-guest-x11-6.1.20-lp152.2.21.1
      virtualbox-guest-x11-debuginfo-6.1.20-lp152.2.21.1
      virtualbox-kmp-debugsource-6.1.20-lp152.2.21.1
      virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
      virtualbox-kmp-default-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
      virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
      virtualbox-kmp-preempt-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1
      virtualbox-qt-6.1.20-lp152.2.21.1
      virtualbox-qt-debuginfo-6.1.20-lp152.2.21.1
      virtualbox-vnc-6.1.20-lp152.2.21.1
      virtualbox-websrv-6.1.20-lp152.2.21.1
      virtualbox-websrv-debuginfo-6.1.20-lp152.2.21.1


References:

   https://www.suse.com/security/cve/CVE-2021-2074.html
   https://www.suse.com/security/cve/CVE-2021-2129.html
   https://www.suse.com/security/cve/CVE-2021-2264.html
   https://bugzilla.suse.com/1181197
   https://bugzilla.suse.com/1181198
   https://bugzilla.suse.com/1183125
   https://bugzilla.suse.com/1183329
   https://bugzilla.suse.com/1184542