Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.853441 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for virtualbox (openSUSE-SU-2020:1486-1) |
Zusammenfassung: | The remote host is missing an update for the 'virtualbox'; package(s) announced via the openSUSE-SU-2020:1486-1 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'virtualbox' package(s) announced via the openSUSE-SU-2020:1486-1 advisory. Vulnerability Insight: This update for virtualbox fixes the following issues: Update to Oracle version 6.1.14a. This minor update enables the building of libvirt again. Version update to 6.1.14 (released September 04 2020 by Oracle) File 'fix_virtio_build.patch' is added to fix a build problem. This is a maintenance release. The following items were fixed and/or added: GUI: Fixes file name changes in the File location field when creating Virtual Hard Disk (bug #19286) VMM: Fixed running VMs which failed to start with VERR_NEM_MISSING_KERNEL_API_2 when Hyper-V is used (bug #19779 and #19804) Audio: fix regression in HDA emulation introduced in 6.1.0 Shared Clipboard: Fixed a potential crash when copying HTML data (6.1.2 regression, bug #19226) Linux host and guest: Linux kernel version 5.8 support EFI: Fixed reading ISO9660 filesystems on attached media (6.1.0 regression, bug #19682) EFI: Support booting from drives attached to the LsiLogic SCSI and SAS controller emulations Pseudo version bump to 6.1.13, which is NOT an Oracle release. Update VB sources to run under kernel 5.8.0+ with no modifications to the kernel. These sources are derived from r85883 of the Oracle svn repository. For operations with USB{2, 3}, the extension pack for revision 140056 must be installed. Once Oracle releases 6.1.14, then the extension pack and VB itself will have the same revision number. File 'fixes_for_5.8.patch' is removed as that part was fixed upstream. Fixes boo#1175201. Apply Oracle changes for kernel 5.8. Version bump to 6.1.12 (released July 14 2020 by Oracle) This is a maintenance release. The following items were fixed and/or added: File 'turn_off_cloud_net.patch' added. Fixes for CVE-2020-14628, CVE-2020-14646, CVE-2020-14647, CVE-2020-14649 CVE-2020-14713, CVE-2020-14674, CVE-2020-14675, CVE-2020-14676 CVE-2020-14677, CVE-2020-14699, CVE-2020-14711, CVE-2020-14629 CVE-2020-14703, CVE-2020-14704, CVE-2020-14648, CVE-2020-14650 CVE-2020-14673, CVE-2020-14694, CVE-2020-14695, CVE-2020-14698 CVE-2020-14700, CVE-2020-14712, CVE-2020-14707, CVE-2020-14714 CVE-2020-14715 boo#1174159. UI: Fixes for Log-Viewer search-backward icon Devices: Fixes and improvements for the BusLogic SCSI controller emulation Serial Port: Regression fixes in FIFO data handling Oracle Cloud Infrastructure integration: Experimental new type of network attachment, allowing local VM to act as if it was run in cloud API: improved resource management in the guest control functionality VBoxManage: fixed command option parsing for the 'snapshot edit' sub-command VB ... Description truncated. Please see the references for more information. Affected Software/OS: 'virtualbox' package(s) on openSUSE Leap 15.2. Solution: Please install the updated package(s). CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-14628 Common Vulnerability Exposure (CVE) ID: CVE-2020-14629 Common Vulnerability Exposure (CVE) ID: CVE-2020-14646 Common Vulnerability Exposure (CVE) ID: CVE-2020-14647 Common Vulnerability Exposure (CVE) ID: CVE-2020-14648 Common Vulnerability Exposure (CVE) ID: CVE-2020-14649 Common Vulnerability Exposure (CVE) ID: CVE-2020-14650 Common Vulnerability Exposure (CVE) ID: CVE-2020-14673 Common Vulnerability Exposure (CVE) ID: CVE-2020-14674 Common Vulnerability Exposure (CVE) ID: CVE-2020-14675 Common Vulnerability Exposure (CVE) ID: CVE-2020-14676 Common Vulnerability Exposure (CVE) ID: CVE-2020-14677 Common Vulnerability Exposure (CVE) ID: CVE-2020-14694 Common Vulnerability Exposure (CVE) ID: CVE-2020-14695 Common Vulnerability Exposure (CVE) ID: CVE-2020-14698 Common Vulnerability Exposure (CVE) ID: CVE-2020-14699 Common Vulnerability Exposure (CVE) ID: CVE-2020-14700 Common Vulnerability Exposure (CVE) ID: CVE-2020-14703 Common Vulnerability Exposure (CVE) ID: CVE-2020-14704 Common Vulnerability Exposure (CVE) ID: CVE-2020-14707 Common Vulnerability Exposure (CVE) ID: CVE-2020-14711 Common Vulnerability Exposure (CVE) ID: CVE-2020-14712 Common Vulnerability Exposure (CVE) ID: CVE-2020-14713 Common Vulnerability Exposure (CVE) ID: CVE-2020-14714 Common Vulnerability Exposure (CVE) ID: CVE-2020-14715 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |