Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 498166 (CVE-2013-5892) - <app-emulation/virtualbox{,-bin}-4.2.22 : Multiple Vulnerabilities (CVE-2013-5892,CVE-2014-{0404,0405,0406,0407})
Summary: <app-emulation/virtualbox{,-bin}-4.2.22 : Multiple Vulnerabilities (CVE-2013-...
Status: RESOLVED FIXED
Alias: CVE-2013-5892
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/56490/
Whiteboard: B1 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-15 13:32 UTC by Agostino Sarubbo
Modified: 2014-01-20 09:18 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-15 13:32:45 UTC
From ${URL} :

Description

Multiple vulnerabilities have been reported in Oracle VirtualBox, which can be exploited by 
malicious, local users to disclose sensitive information, manipulate certain data, cause a DoS 
(Denial of Service), and gain escalated privileges.

1) An error within the Core subcomponent can be exploited by local users to gain escalated 
privileges.

This vulnerability is reported in versions 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.6.

2) An error within the Core subcomponent can be exploited by local users to gain escalated 
privileges.

3) An error within the Core subcomponent can be exploited to disclose, update, insert, or delete 
certain data and to cause a crash.

4) An error within the Core subcomponent can be exploited to update, insert, or delete certain data 
and to cause a crash.

5) An error within the Core subcomponent can be exploited to disclose, update, insert, or delete 
certain data and to cause a crash.

These vulnerabilities #2 through #5 are reported in versions 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 
4.3.4.


Solution:
Apply update (please see the vendor's advisory for details).

Further details available to Secunia VIM customers

Provided and/or discovered by:
It is currently unclear who reported the vulnerabilities as the Oracle Critical Patch Update for 
January 2014 only provides a bundled list of credits. This section will be updated when/if the 
original reporters provide more information.

Original Advisory:
Oracle:
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html#AppendixOVIR
http://www.oracle.com/technetwork/topics/security/cpujan2014verbose-1972951.html#OVIR


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2014-01-15 13:43:08 UTC
Arches please test and mark stable the following set of packages:

=app-emulation/virtualbox-4.2.22
=app-emulation/virtualbox-additions-4.2.22
=app-emulation/virtualbox-bin-4.2.22
=app-emulation/virtualbox-extpack-oracle-4.2.22
=app-emulation/virtualbox-guest-additions-4.2.22
=app-emulation/virtualbox-modules-4.2.22
=x11-drivers/xf86-video-virtualbox-4.2.22

Target keywords are:
amd64 x86



@security: There's no fixed 4.3.x version available yet.
Comment 2 Agostino Sarubbo gentoo-dev 2014-01-16 20:28:33 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2014-01-16 20:29:07 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2014-01-17 18:16:21 UTC
Adding GLSA's as version 4.0.22 addresses CVE's as part of 4.0.20
(CVE-2013-5892, CVE-2014-{0404-0407})
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2014-01-17 18:17:21 UTC
Meant to say... adding CVE's and adding this to existing GLSA.
Comment 6 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2014-01-17 22:07:07 UTC
(In reply to Agostino Sarubbo from comment #3)
> 
> Maintainer(s), please cleanup.


Done...
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2014-01-20 09:18:14 UTC
This issue was resolved and addressed in
 GLSA 201401-13 at http://security.gentoo.org/glsa/glsa-201401-13.xml
by GLSA coordinator Sergey Popov (pinkbyte).