opensuse-su-2024:0364-1
Vulnerability from csaf_opensuse
Published
2024-11-10 09:55
Modified
2024-11-10 09:55
Summary
Security update for virtualbox
Notes
Title of the patch
Security update for virtualbox
Description of the patch
This update for virtualbox fixes the following issues:
Update to release 7.1.4:
* NAT: Fixed DHCP problems with certain guests when domain is
empty
* VMSVGA: Improved flickering, black screen and other screen
update issues with recent Linux kernels
* Linux Guest Additions: Introduce initial support for kernel 6.12
* EFI: Added missing LsiLogic MPT SCSI driver again to fix
booting from devices attached to this device if the EFI
firmware is used (7.1.0 regression)
* EFI: Restored broken network boot support (7.1.0 regression)
* Adressed CVE-2024-21248 [boo#1231735],
CVE-2024-21273 [boo#1231736], CVE-2024-21259 [boo#1231737],
CVE-2024-21263 [boo#1231738]
- Make the Extension Pack work with our compiler flags and RT_NOEXCEPT choices. [boo#1231225]
Update to release 7.1:
* The GUI now offers a selection between Basic and Experienced
user level with reduced or full UI functionality.
* VRDE: If user does not set up TLS with custom certificates,
enable it with self-signed certificate, including issuing a
new one before the old one expires
* NAT: New engine with IPv6 support.
* Linux host and guest: Added Wayland support for Clipboard
sharing.
- Changed license from Gpl-2.0 to Gpl-3.0
Version bump to VirtualBox 7.0.20 (released July 16 2024 by Oracle))
This is a maintenance release. The following items were fixed and/or added:
- TPM: Fixed errors appearing the event viewer with Windows guests
- macOS Hosts: Fixed passing USB devices to the VM (bug #21218)
- Audio: Fixed recording with HDA emulation after newer Windows 10 / 11 guests got rebooted
- USB: Fixed a deadlock in OHCI triggered when saving the current state of a VM or taking a snapshot (bug #22059)
- Linux Guest and Host: Introduced initial support for OpenSuse 15.6 kernel
- Linux Guest and Host: Introduced initial support for RHEL 9.5 kernel (bug #22099)
- Guest Additions: Shared Clipboard: Fixed issue when extra new lines were pasted when copying text between Win and X11 (bug #21716)
- UEFI Secure Boot: Add new Microsoft certificates to list for new VMs
Patchnames
openSUSE-2024-364
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for virtualbox", "title": "Title of the patch" }, { "category": "description", "text": "This update for virtualbox fixes the following issues:\n\nUpdate to release 7.1.4:\n\n* NAT: Fixed DHCP problems with certain guests when domain is\n empty\n* VMSVGA: Improved flickering, black screen and other screen\n update issues with recent Linux kernels\n* Linux Guest Additions: Introduce initial support for kernel 6.12\n* EFI: Added missing LsiLogic MPT SCSI driver again to fix\n booting from devices attached to this device if the EFI\n firmware is used (7.1.0 regression)\n* EFI: Restored broken network boot support (7.1.0 regression)\n* Adressed CVE-2024-21248 [boo#1231735],\n CVE-2024-21273 [boo#1231736], CVE-2024-21259 [boo#1231737],\n CVE-2024-21263 [boo#1231738]\n\n- Make the Extension Pack work with our compiler flags and RT_NOEXCEPT choices. [boo#1231225]\n\nUpdate to release 7.1:\n\n* The GUI now offers a selection between Basic and Experienced\n user level with reduced or full UI functionality.\n* VRDE: If user does not set up TLS with custom certificates,\n enable it with self-signed certificate, including issuing a\n new one before the old one expires\n* NAT: New engine with IPv6 support.\n* Linux host and guest: Added Wayland support for Clipboard\n sharing.\n\n- Changed license from Gpl-2.0 to Gpl-3.0\n\nVersion bump to VirtualBox 7.0.20 (released July 16 2024 by Oracle))\n\nThis is a maintenance release. The following items were fixed and/or added:\n\n- TPM: Fixed errors appearing the event viewer with Windows guests\n- macOS Hosts: Fixed passing USB devices to the VM (bug #21218)\n- Audio: Fixed recording with HDA emulation after newer Windows 10 / 11 guests got rebooted\n- USB: Fixed a deadlock in OHCI triggered when saving the current state of a VM or taking a snapshot (bug #22059)\n- Linux Guest and Host: Introduced initial support for OpenSuse 15.6 kernel\n- Linux Guest and Host: Introduced initial support for RHEL 9.5 kernel (bug #22099)\n- Guest Additions: Shared Clipboard: Fixed issue when extra new lines were pasted when copying text between Win and X11 (bug #21716)\n- UEFI Secure Boot: Add new Microsoft certificates to list for new VMs \n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2024-364", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0364-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:0364-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELCE6LNULD7SDN6FX3HW5773W3KTCWXS/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:0364-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELCE6LNULD7SDN6FX3HW5773W3KTCWXS/" }, { "category": "self", "summary": "SUSE Bug 1231225", "url": "https://bugzilla.suse.com/1231225" }, { "category": "self", "summary": "SUSE Bug 1231735", "url": "https://bugzilla.suse.com/1231735" }, { "category": "self", "summary": "SUSE Bug 1231736", "url": "https://bugzilla.suse.com/1231736" }, { "category": "self", "summary": "SUSE Bug 1231737", "url": "https://bugzilla.suse.com/1231737" }, { "category": "self", "summary": "SUSE Bug 1231738", "url": "https://bugzilla.suse.com/1231738" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21248 page", "url": "https://www.suse.com/security/cve/CVE-2024-21248/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21259 page", "url": "https://www.suse.com/security/cve/CVE-2024-21259/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21263 page", "url": "https://www.suse.com/security/cve/CVE-2024-21263/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21273 page", "url": "https://www.suse.com/security/cve/CVE-2024-21273/" } ], "title": "Security update for virtualbox", "tracking": { "current_release_date": "2024-11-10T09:55:36Z", "generator": { "date": "2024-11-10T09:55:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:0364-1", "initial_release_date": "2024-11-10T09:55:36Z", "revision_history": [ { "date": "2024-11-10T09:55:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "product": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "product": { "name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "product_id": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch" } }, { "category": "product_version", "name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "product": { "name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "product_id": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch" } }, { "category": "product_version", "name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "product": { "name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "product_id": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "product": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "product": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "product_id": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "product_id": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "product": { "name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "product_id": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP6", "product": { "name": "SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6" } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64" }, "product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch" }, "product_reference": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" }, "product_reference": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21248", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21248" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21248", "url": "https://www.suse.com/security/cve/CVE-2024-21248" }, { "category": "external", "summary": "SUSE Bug 1231735 for CVE-2024-21248", "url": "https://bugzilla.suse.com/1231735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-10T09:55:36Z", "details": "moderate" } ], "title": "CVE-2024-21248" }, { "cve": "CVE-2024-21259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21259" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21259", "url": "https://www.suse.com/security/cve/CVE-2024-21259" }, { "category": "external", "summary": "SUSE Bug 1231737 for CVE-2024-21259", "url": "https://bugzilla.suse.com/1231737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-10T09:55:36Z", "details": "important" } ], "title": "CVE-2024-21259" }, { "cve": "CVE-2024-21263", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21263" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21263", "url": "https://www.suse.com/security/cve/CVE-2024-21263" }, { "category": "external", "summary": "SUSE Bug 1231738 for CVE-2024-21263", "url": "https://bugzilla.suse.com/1231738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-10T09:55:36Z", "details": "moderate" } ], "title": "CVE-2024-21263" }, { "cve": "CVE-2024-21273", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21273" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21273", "url": "https://www.suse.com/security/cve/CVE-2024-21273" }, { "category": "external", "summary": "SUSE Bug 1231736 for CVE-2024-21273", "url": "https://bugzilla.suse.com/1231736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le", "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch", "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64", "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-10T09:55:36Z", "details": "moderate" } ], "title": "CVE-2024-21273" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…