VirtualBox: Multiple vulnerabilities — GLSA 202004-02

Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.

Affected packages

app-emulation/virtualbox on all architectures
Affected versions < 5.2.36
Unaffected versions >= 5.2.36
app-emulation/virtualbox-bin on all architectures
Affected versions < 5.2.36
Unaffected versions >= 5.2.36

Background

VirtualBox is a powerful virtualization product from Oracle.

Description

Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.

Impact

An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts.

Workaround

There is no known workaround at this time.

Resolution

All VirtualBox 5.2.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.2.36"
 

All VirtualBox 6.0.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.0.16"
 

All VirtualBox 6.1.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.2"
 

All VirtualBox binary 5.2.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-emulation/virtualbox-bin-5.2.36"
 

All VirtualBox binary 6.0.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-emulation/virtualbox-bin-6.0.16"
 

All VirtualBox binary 6.1.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-emulation/virtualbox-bin-6.1.2"
 

References

Release date
April 01, 2020

Latest revision
April 26, 2020: 2

Severity
normal

Exploitable
local, remote

Bugzilla entries