opensuse-su-2023:0033-1
Vulnerability from csaf_opensuse
Published
2023-01-29 03:02
Modified
2023-01-29 03:02
Summary
Security update for virtualbox
Notes
Title of the patch
Security update for virtualbox
Description of the patch
This update for virtualbox fixes the following issues:
VirtualBox 7.0.6 (released January 17 2023)
This is a maintenance release. The following items were fixed and/or added: [1]
- VMM: Fixed guru running the FreeBSD loader on older Intel CPUs without unrestricted guest support (bug #21332)
- GUI: Fixed virtual machines grouping when VM was created or modified in command line (bugs #11500, #20933)
- GUI: Introduced generic changes in settings dialogs
- VirtioNet: Fixed broken network after loading saved state (bug #21172)
- Storage: Added support for increasing the size of the following VMDK image variants: monolithicFlat, monolithicSparse, twoGbMaxExtentSparse, twoGbMaxExtentFlat
- VBoxManage: Added missing --directory switch for guestcontrol mktemp command
- Mouse Integration: Guest was provided with extended host mouse state (bug #21139)
- DnD: Introduced generic improvements
- Guest Control: Fixed handling creation mode for temporary directories (bug #21394)
- Linux Host and Guest: Added initial support for building UEK7 kernel on Oracle Linux 8
- Linux Host and Guest: Added initial support for RHEL 9.1 kernel
- Linux Guest Additions: Added initial support for kernel 6.2 for vboxvideo
- Audio: The '--audio' option in VBoxManage is now marked as deprecated; please use '--audio-driver' and '--audio-enabled' instead. This will allow more flexibility when changing the driver and/or controlling the audio functionality
Additionally, it fixes 6 CVE's: CVE-2023-21886, CVE-2023-21898, CVE-2023-21899, CVE-2023-21884, CVE-2023-21885, CVE-2023-21889
Links:
[1] https://www.virtualbox.org/wiki/Changelog-7.0#v6
[2] https://www.oracle.com/security-alerts/cpujan2023.html#AppendixOVIR
Patchnames
openSUSE-2023-33
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for virtualbox", "title": "Title of the patch" }, { "category": "description", "text": "This update for virtualbox fixes the following issues:\n\nVirtualBox 7.0.6 (released January 17 2023)\n\nThis is a maintenance release. The following items were fixed and/or added: [1]\n\n- VMM: Fixed guru running the FreeBSD loader on older Intel CPUs without unrestricted guest support (bug #21332)\n- GUI: Fixed virtual machines grouping when VM was created or modified in command line (bugs #11500, #20933)\n- GUI: Introduced generic changes in settings dialogs\n- VirtioNet: Fixed broken network after loading saved state (bug #21172)\n- Storage: Added support for increasing the size of the following VMDK image variants: monolithicFlat, monolithicSparse, twoGbMaxExtentSparse, twoGbMaxExtentFlat\n- VBoxManage: Added missing --directory switch for guestcontrol mktemp command\n- Mouse Integration: Guest was provided with extended host mouse state (bug #21139)\n- DnD: Introduced generic improvements\n- Guest Control: Fixed handling creation mode for temporary directories (bug #21394)\n- Linux Host and Guest: Added initial support for building UEK7 kernel on Oracle Linux 8\n- Linux Host and Guest: Added initial support for RHEL 9.1 kernel\n- Linux Guest Additions: Added initial support for kernel 6.2 for vboxvideo\n- Audio: The \u0027--audio\u0027 option in VBoxManage is now marked as deprecated; please use \u0027--audio-driver\u0027 and \u0027--audio-enabled\u0027 instead. This will allow more flexibility when changing the driver and/or controlling the audio functionality \n\nAdditionally, it fixes 6 CVE\u0027s: CVE-2023-21886, CVE-2023-21898, CVE-2023-21899, CVE-2023-21884, CVE-2023-21885, CVE-2023-21889\n\t\t\t\t\t\t\t\t\nLinks:\n\n[1] https://www.virtualbox.org/wiki/Changelog-7.0#v6\n[2] https://www.oracle.com/security-alerts/cpujan2023.html#AppendixOVIR\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2023-33", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0033-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2023:0033-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWZRBMAFTGYSKDYZ6FDHSZBLFZOG7IYG/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2023:0033-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWZRBMAFTGYSKDYZ6FDHSZBLFZOG7IYG/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21884 page", "url": "https://www.suse.com/security/cve/CVE-2023-21884/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21885 page", "url": "https://www.suse.com/security/cve/CVE-2023-21885/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21886 page", "url": "https://www.suse.com/security/cve/CVE-2023-21886/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21889 page", "url": "https://www.suse.com/security/cve/CVE-2023-21889/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21898 page", "url": "https://www.suse.com/security/cve/CVE-2023-21898/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21899 page", "url": "https://www.suse.com/security/cve/CVE-2023-21899/" } ], "title": "Security update for virtualbox", "tracking": { "current_release_date": "2023-01-29T03:02:15Z", "generator": { "date": "2023-01-29T03:02:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2023:0033-1", "initial_release_date": "2023-01-29T03:02:15Z", "revision_history": [ { "date": "2023-01-29T03:02:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "product": { "name": "virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "product_id": "virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch" } }, { "category": "product_version", "name": "virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "product": { "name": "virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "product_id": "virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch" } }, { "category": "product_version", "name": "virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "product": { "name": "virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "product_id": "virtualbox-host-source-7.0.6-lp154.2.26.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "product_id": "python3-virtualbox-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-devel-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "product_id": "virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-qt-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64" } }, { "category": "product_version", "name": "virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64", "product": { "name": "virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64", "product_id": "virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python3-virtualbox-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-devel-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch" }, "product_reference": "virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch" }, "product_reference": "virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-host-source-7.0.6-lp154.2.26.2.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch" }, "product_reference": "virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-qt-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" }, "product_reference": "virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21884" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21884", "url": "https://www.suse.com/security/cve/CVE-2023-21884" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21884", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21884" }, { "cve": "CVE-2023-21885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21885" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21885", "url": "https://www.suse.com/security/cve/CVE-2023-21885" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21885", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21885" }, { "cve": "CVE-2023-21886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21886" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21886", "url": "https://www.suse.com/security/cve/CVE-2023-21886" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21886", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21886" }, { "cve": "CVE-2023-21889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21889" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21889", "url": "https://www.suse.com/security/cve/CVE-2023-21889" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21889", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21889" }, { "cve": "CVE-2023-21898", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21898" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21898", "url": "https://www.suse.com/security/cve/CVE-2023-21898" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21898", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21898" }, { "cve": "CVE-2023-21899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21899" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21899", "url": "https://www.suse.com/security/cve/CVE-2023-21899" }, { "category": "external", "summary": "SUSE Bug 1207285 for CVE-2023-21899", "url": "https://bugzilla.suse.com/1207285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.4:python3-virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-devel-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-guest-tools-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-host-source-7.0.6-lp154.2.26.2.noarch", "openSUSE Leap 15.4:virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-qt-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-vnc-7.0.6-lp154.2.26.2.x86_64", "openSUSE Leap 15.4:virtualbox-websrv-7.0.6-lp154.2.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-29T03:02:15Z", "details": "important" } ], "title": "CVE-2023-21899" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…