openSUSE2021:0630-1: important: Security update for virtualbox

openSUSE Security Update: Security update for virtualbox ______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0630-1 Rating: important References: #1181197 #1181198 #1183125 #1183329 #1184542
Cross-References: CVE-2021-2074 CVE-2021-2129 CVE-2021-2264
CVSS scores: CVE-2021-2074 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2021-2129 (NVD) : 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N CVE-2021-2264 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________
An update that solves three vulnerabilities and has two fixes is now available.
Description:
This update for virtualbox fixes the following issues:
– Version bump to 6.1.20 (released April 20 2021 by Oracle) Fixes boo#1183329 “virtualbox 6.1.18 crashes when it runs nested VM” Fixes boo#1183125 “Leap 15.3 installation in Virtualbox without VBox integration” Fixes CVE-2021-2264 and boo#1184542. The directory for the .start files for autostarting VMs is moved from /etc/vbox to /etc/vbox/autostart.d. In addition, the autostart service is hardened (by Oracle). – change the modalias for guest-tools and guest-x11 to get them to autoinstall. – Own %{_sysconfdir}/X11/xinit/xinitrc.d as default packages (eg systemd) no longer do so, breaking package build. – Update fixes_for_leap15.3 for kernel API changes between 5.3.18-45 and 5.3.18-47. – update-extpack.sh: explicitly use https:// protocol for authenticity. The http:// URL is currently redirected to https:// but don’t rely on this. – Add code to generate guest modules for Leap 15.2 and Leap 15.3. The kernel versions do not allow window resizing. Files “virtualbox-kmp-files-leap” and “vboxguestconfig.sh” are added – Fixes CVE-2021-2074, boo#1181197 and CVE-2021-2129, boo#1181198. – Under some circumstances, shared folders are mounted as root.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-630=1

Package List:
– openSUSE Leap 15.2 (noarch):
virtualbox-guest-desktop-icons-6.1.20-lp152.2.21.1 virtualbox-guest-source-6.1.20-lp152.2.21.1 virtualbox-host-source-6.1.20-lp152.2.21.1
– openSUSE Leap 15.2 (x86_64):
python3-virtualbox-6.1.20-lp152.2.21.1 python3-virtualbox-debuginfo-6.1.20-lp152.2.21.1 virtualbox-6.1.20-lp152.2.21.1 virtualbox-debuginfo-6.1.20-lp152.2.21.1 virtualbox-debugsource-6.1.20-lp152.2.21.1 virtualbox-devel-6.1.20-lp152.2.21.1 virtualbox-guest-tools-6.1.20-lp152.2.21.1 virtualbox-guest-tools-debuginfo-6.1.20-lp152.2.21.1 virtualbox-guest-x11-6.1.20-lp152.2.21.1 virtualbox-guest-x11-debuginfo-6.1.20-lp152.2.21.1 virtualbox-kmp-debugsource-6.1.20-lp152.2.21.1 virtualbox-kmp-default-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-default-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-preempt-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-kmp-preempt-debuginfo-6.1.20_k5.3.18_lp152.72-lp152.2.21.1 virtualbox-qt-6.1.20-lp152.2.21.1 virtualbox-qt-debuginfo-6.1.20-lp152.2.21.1 virtualbox-vnc-6.1.20-lp152.2.21.1 virtualbox-websrv-6.1.20-lp152.2.21.1 virtualbox-websrv-debuginfo-6.1.20-lp152.2.21.1
References:
www.suse.com/security/cve/CVE-2021-2074.html www.suse.com/security/cve/CVE-2021-2129.html www.suse.com/security/cve/CVE-2021-2264.html bugzilla.suse.com/1181197 bugzilla.suse.com/1181198 bugzilla.suse.com/1183125 bugzilla.suse.com/1183329 bugzilla.suse.com/1184542