Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.853441
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for virtualbox (openSUSE-SU-2020:1486-1)
Zusammenfassung:The remote host is missing an update for the 'virtualbox'; package(s) announced via the openSUSE-SU-2020:1486-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'virtualbox'
package(s) announced via the openSUSE-SU-2020:1486-1 advisory.

Vulnerability Insight:
This update for virtualbox fixes the following issues:

Update to Oracle version 6.1.14a.

This minor update enables the building of libvirt again.

Version update to 6.1.14 (released September 04 2020 by Oracle)

File 'fix_virtio_build.patch' is added to fix a build problem. This is a
maintenance release. The following items were fixed and/or added: GUI:
Fixes file name changes in the File location field when creating Virtual
Hard Disk (bug #19286) VMM: Fixed running VMs which failed to start with
VERR_NEM_MISSING_KERNEL_API_2 when Hyper-V is used (bug #19779 and #19804)
Audio: fix regression in HDA emulation introduced in 6.1.0 Shared
Clipboard: Fixed a potential crash when copying HTML data (6.1.2
regression, bug #19226) Linux host and guest: Linux kernel version 5.8
support EFI: Fixed reading ISO9660 filesystems on attached media (6.1.0
regression, bug #19682) EFI: Support booting from drives attached to the
LsiLogic SCSI and SAS controller emulations

Pseudo version bump to 6.1.13, which is NOT an Oracle release.

Update VB sources to run under kernel 5.8.0+ with no modifications to
the kernel. These sources are derived from r85883 of the Oracle svn
repository. For operations with USB{2, 3}, the extension pack for revision
140056 must be installed. Once Oracle releases 6.1.14, then the extension
pack and VB itself will have the same revision number. File
'fixes_for_5.8.patch' is removed as that part was fixed upstream. Fixes
boo#1175201.

Apply Oracle changes for kernel 5.8.

Version bump to 6.1.12 (released July 14 2020 by Oracle)

This is a maintenance release. The following items were fixed and/or
added: File 'turn_off_cloud_net.patch' added. Fixes for CVE-2020-14628,
CVE-2020-14646, CVE-2020-14647, CVE-2020-14649 CVE-2020-14713,
CVE-2020-14674, CVE-2020-14675, CVE-2020-14676 CVE-2020-14677,
CVE-2020-14699, CVE-2020-14711, CVE-2020-14629 CVE-2020-14703,
CVE-2020-14704, CVE-2020-14648, CVE-2020-14650 CVE-2020-14673,
CVE-2020-14694, CVE-2020-14695, CVE-2020-14698 CVE-2020-14700,
CVE-2020-14712, CVE-2020-14707, CVE-2020-14714 CVE-2020-14715 boo#1174159.
UI: Fixes for Log-Viewer search-backward icon Devices: Fixes and
improvements for the BusLogic SCSI controller emulation Serial Port:
Regression fixes in FIFO data handling Oracle Cloud Infrastructure
integration: Experimental new type of network attachment, allowing local
VM to act as if it was run in cloud API: improved resource management in
the guest control functionality VBoxManage: fixed command option parsing
for the 'snapshot edit' sub-command VB ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'virtualbox' package(s) on openSUSE Leap 15.2.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-14628
Common Vulnerability Exposure (CVE) ID: CVE-2020-14629
Common Vulnerability Exposure (CVE) ID: CVE-2020-14646
Common Vulnerability Exposure (CVE) ID: CVE-2020-14647
Common Vulnerability Exposure (CVE) ID: CVE-2020-14648
Common Vulnerability Exposure (CVE) ID: CVE-2020-14649
Common Vulnerability Exposure (CVE) ID: CVE-2020-14650
Common Vulnerability Exposure (CVE) ID: CVE-2020-14673
Common Vulnerability Exposure (CVE) ID: CVE-2020-14674
Common Vulnerability Exposure (CVE) ID: CVE-2020-14675
Common Vulnerability Exposure (CVE) ID: CVE-2020-14676
Common Vulnerability Exposure (CVE) ID: CVE-2020-14677
Common Vulnerability Exposure (CVE) ID: CVE-2020-14694
Common Vulnerability Exposure (CVE) ID: CVE-2020-14695
Common Vulnerability Exposure (CVE) ID: CVE-2020-14698
Common Vulnerability Exposure (CVE) ID: CVE-2020-14699
Common Vulnerability Exposure (CVE) ID: CVE-2020-14700
Common Vulnerability Exposure (CVE) ID: CVE-2020-14703
Common Vulnerability Exposure (CVE) ID: CVE-2020-14704
Common Vulnerability Exposure (CVE) ID: CVE-2020-14707
Common Vulnerability Exposure (CVE) ID: CVE-2020-14711
Common Vulnerability Exposure (CVE) ID: CVE-2020-14712
Common Vulnerability Exposure (CVE) ID: CVE-2020-14713
Common Vulnerability Exposure (CVE) ID: CVE-2020-14714
Common Vulnerability Exposure (CVE) ID: CVE-2020-14715
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.