Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 717626 (CVE-2020-2575, CVE-2020-2741, CVE-2020-2742, CVE-2020-2743, CVE-2020-2748, CVE-2020-2758, CVE-2020-2894, CVE-2020-2902, CVE-2020-2905, CVE-2020-2907, CVE-2020-2908, CVE-2020-2909, CVE-2020-2910, CVE-2020-2911, CVE-2020-2913, CVE-2020-2914, CVE-2020-2929, CVE-2020-2951, CVE-2020-2958, CVE-2020-2959) - <app-emulation/virtualbox{-bin}-{5.2.40,6.0.20,6.1.6}: Multiple vulnerabilities (CVE-2020-{2575,2741,2742,2743,2748,2758,2894,2902,2905,2907,2908,2909,2910,2911,2913,2914,2929,2951,2958,2959})
Summary: <app-emulation/virtualbox{-bin}-{5.2.40,6.0.20,6.1.6}: Multiple vulnerabiliti...
Status: RESOLVED FIXED
Alias: CVE-2020-2575, CVE-2020-2741, CVE-2020-2742, CVE-2020-2743, CVE-2020-2748, CVE-2020-2758, CVE-2020-2894, CVE-2020-2902, CVE-2020-2905, CVE-2020-2907, CVE-2020-2908, CVE-2020-2909, CVE-2020-2910, CVE-2020-2911, CVE-2020-2913, CVE-2020-2914, CVE-2020-2929, CVE-2020-2951, CVE-2020-2958, CVE-2020-2959
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa+ cve]
Keywords: CC-ARCHES
Depends on:
Blocks: CVE-2019-2926, CVE-2019-2944, CVE-2019-2984, CVE-2019-3002, CVE-2019-3005, CVE-2019-3017, CVE-2019-3021, CVE-2019-3026, CVE-2019-3028, CVE-2019-3031, CVE-2020-2674, CVE-2020-2678, CVE-2020-2681, CVE-2020-2682, CVE-2020-2689, CVE-2020-2690, CVE-2020-2691, CVE-2020-2692, CVE-2020-2693, CVE-2020-2698, CVE-2020-2702, CVE-2020-2703, CVE-2020-2704, CVE-2020-2705, CVE-2020-2725, CVE-2020-2726, CVE-2020-2727
  Show dependency tree
 
Reported: 2020-04-15 21:25 UTC by GLSAMaker/CVETool Bot
Modified: 2021-01-12 17:57 UTC (History)
2 users (show)

See Also:
Package list:
=app-emulation/virtualbox-5.2.40 amd64 x86 =app-emulation/virtualbox-modules-5.2.40 amd64 x86 =app-emulation/virtualbox-guest-additions-5.2.40 amd64 x86 =app-emulation/virtualbox-extpack-oracle-5.2.40.137108 amd64 x86 =app-emulation/virtualbox-bin-5.2.40.137108 amd64 x86 =app-emulation/virtualbox-additions-5.2.40 amd64 x86
Runtime testing required: ---
nattka: sanity-check-


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-15 21:25:45 UTC
CVE-2020-2959 (https://nvd.nist.gov/vuln/detail/CVE-2020-2959):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  unauthenticated attacker with network access via MLD to compromise Oracle VM
  VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may
  significantly impact additional products. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0
  Base Score 8.6 (Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).

CVE-2020-2951 (https://nvd.nist.gov/vuln/detail/CVE-2020-2951):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  low privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5
  (Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).

CVE-2020-2902 (https://nvd.nist.gov/vuln/detail/CVE-2020-2902):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  low privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2909 (https://nvd.nist.gov/vuln/detail/CVE-2020-2909):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  low privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks
  require human interaction from a person other than the attacker. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0
  Base Score 2.8 (Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).

CVE-2020-2929 (https://nvd.nist.gov/vuln/detail/CVE-2020-2929):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  low privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks
  of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS
  3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).
  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVE-2020-2748 (https://nvd.nist.gov/vuln/detail/CVE-2020-2748):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  unauthorized read access to a subset of Oracle VM VirtualBox accessible
  data. CVSS 3.0 Base Score 3.2 (Confidentiality impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).

CVE-2020-2741 (https://nvd.nist.gov/vuln/detail/CVE-2020-2741):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  unauthorized access to critical data or complete access to all Oracle VM
  VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality
  impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).

CVE-2020-2908 (https://nvd.nist.gov/vuln/detail/CVE-2020-2908):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2905 (https://nvd.nist.gov/vuln/detail/CVE-2020-2905):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2894 (https://nvd.nist.gov/vuln/detail/CVE-2020-2894):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2758 (https://nvd.nist.gov/vuln/detail/CVE-2020-2758):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows
  high privileged attacker with logon to the infrastructure where Oracle VM
  VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2958 (https://nvd.nist.gov/vuln/detail/CVE-2020-2958):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability
  allows high privileged attacker with logon to the infrastructure where
  Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2911 (https://nvd.nist.gov/vuln/detail/CVE-2020-2911):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability
  allows high privileged attacker with logon to the infrastructure where
  Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2907 (https://nvd.nist.gov/vuln/detail/CVE-2020-2907):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability
  allows high privileged attacker with logon to the infrastructure where
  Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2020-04-17 00:01:47 UTC
CVE-2020-2914 (https://nvd.nist.gov/vuln/detail/CVE-2020-2914):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 6.0.20
  and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged
  attacker with logon to the infrastructure where Oracle VM VirtualBox
  executes to compromise Oracle VM VirtualBox. Successful attacks of this
  vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base
  Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS
  Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVE-2020-2913 (https://nvd.nist.gov/vuln/detail/CVE-2020-2913):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 6.0.20
  and prior to 6.1.6. Difficult to exploit vulnerability allows low privileged
  attacker with logon to the infrastructure where Oracle VM VirtualBox
  executes to compromise Oracle VM VirtualBox. Successful attacks of this
  vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base
  Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS
  Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVE-2020-2910 (https://nvd.nist.gov/vuln/detail/CVE-2020-2910):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 6.0.20
  and prior to 6.1.6. Easily exploitable vulnerability allows low privileged
  attacker with logon to the infrastructure where Oracle VM VirtualBox
  executes to compromise Oracle VM VirtualBox. While the vulnerability is in
  Oracle VM VirtualBox, attacks may significantly impact additional products.
  Successful attacks of this vulnerability can result in unauthorized
  creation, deletion or modification access to critical data or all Oracle VM
  VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Integrity impacts).
  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).
Comment 2 Larry the Git Cow gentoo-dev 2020-04-18 15:42:12 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=589205766d01dfbffb4b4e95a99aa5dfa19a0389

commit 589205766d01dfbffb4b4e95a99aa5dfa19a0389
Author:     Lars Wendler <polynomial-c@gentoo.org>
AuthorDate: 2020-04-18 14:58:56 +0000
Commit:     Lars Wendler <polynomial-c@gentoo.org>
CommitDate: 2020-04-18 15:42:02 +0000

    virtualbox packages: Security bump to ver 5.2.40, 6.0.20 and 6.1.6
    
    Bug: https://bugs.gentoo.org/717626
    Closes: https://bugs.gentoo.org/715726
    Package-Manager: Portage-2.3.99, Repoman-2.3.22
    Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>

 app-emulation/virtualbox-additions/Manifest        |   3 +
 .../virtualbox-additions-5.2.40.ebuild             |  33 ++
 .../virtualbox-additions-6.0.20.ebuild             |  34 ++
 .../virtualbox-additions-6.1.6.ebuild              |  34 ++
 app-emulation/virtualbox-bin/Manifest              |  10 +
 .../virtualbox-bin-5.2.40.137108.ebuild            | 287 ++++++++++++
 .../virtualbox-bin-6.0.20.137117.ebuild            | 292 ++++++++++++
 .../virtualbox-bin-6.1.6.137129.ebuild             | 292 ++++++++++++
 app-emulation/virtualbox-extpack-oracle/Manifest   |   3 +
 .../virtualbox-extpack-oracle-5.2.40.137108.ebuild |  42 ++
 .../virtualbox-extpack-oracle-6.0.20.137117.ebuild |  43 ++
 .../virtualbox-extpack-oracle-6.1.6.137129.ebuild  |  43 ++
 app-emulation/virtualbox-guest-additions/Manifest  |   4 +
 .../virtualbox-guest-additions-5.2.40.ebuild       | 229 +++++++++
 .../virtualbox-guest-additions-6.0.20.ebuild       | 216 +++++++++
 .../virtualbox-guest-additions-6.1.6.ebuild        | 215 +++++++++
 app-emulation/virtualbox-modules/Manifest          |   3 +
 .../virtualbox-modules-5.2.40.ebuild               |  59 +++
 .../virtualbox-modules-6.0.20.ebuild               |  55 +++
 .../virtualbox-modules-6.1.6.ebuild                |  55 +++
 app-emulation/virtualbox/Manifest                  |   4 +
 app-emulation/virtualbox/virtualbox-5.2.40.ebuild  | 496 ++++++++++++++++++++
 app-emulation/virtualbox/virtualbox-6.0.20.ebuild  | 511 +++++++++++++++++++++
 app-emulation/virtualbox/virtualbox-6.1.6.ebuild   | 507 ++++++++++++++++++++
 24 files changed, 3470 insertions(+)
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-19 08:33:17 UTC
@maintainer(s), please advise if ready for stabilisation, or call yourself
Comment 4 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2020-04-22 14:03:25 UTC
amd64 stable
Comment 5 Thomas Deutschmann (RETIRED) gentoo-dev 2020-04-26 23:48:59 UTC
x86 stable
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-28 19:41:31 UTC
@maintainer(s), please cleanup
Comment 7 Larry the Git Cow gentoo-dev 2020-04-29 08:39:03 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c9fcfc7c28e467a0419704b2830d4e7f2200469a

commit c9fcfc7c28e467a0419704b2830d4e7f2200469a
Author:     Lars Wendler <polynomial-c@gentoo.org>
AuthorDate: 2020-04-29 08:35:41 +0000
Commit:     Lars Wendler <polynomial-c@gentoo.org>
CommitDate: 2020-04-29 08:38:52 +0000

    virtualbox packages: Security cleanup
    
    Bug: https://bugs.gentoo.org/717626
    Package-Manager: Portage-2.3.99, Repoman-2.3.22
    Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>

 app-emulation/virtualbox-additions/Manifest        |   4 -
 .../virtualbox-additions-5.2.32.ebuild             |  33 --
 .../virtualbox-additions-5.2.36.ebuild             |  33 --
 .../virtualbox-additions-6.0.16.ebuild             |  34 --
 .../virtualbox-additions-6.1.4.ebuild              |  34 --
 app-emulation/virtualbox-bin/Manifest              |  14 -
 .../virtualbox-bin-5.2.32.132073.ebuild            | 287 ------------
 .../virtualbox-bin-5.2.36.135684.ebuild            | 287 ------------
 .../virtualbox-bin-6.0.16.135674-r1.ebuild         | 292 ------------
 .../virtualbox-bin-6.1.4.136177-r1.ebuild          | 292 ------------
 app-emulation/virtualbox-extpack-oracle/Manifest   |   4 -
 .../virtualbox-extpack-oracle-5.2.32.132073.ebuild |  42 --
 .../virtualbox-extpack-oracle-5.2.36.135684.ebuild |  42 --
 .../virtualbox-extpack-oracle-6.0.16.135674.ebuild |  43 --
 .../virtualbox-extpack-oracle-6.1.4.136177.ebuild  |  43 --
 app-emulation/virtualbox-guest-additions/Manifest  |   6 -
 .../virtualbox-guest-additions-5.2.32.ebuild       | 229 ---------
 .../virtualbox-guest-additions-5.2.36.ebuild       | 229 ---------
 .../virtualbox-guest-additions-6.0.16-r1.ebuild    | 216 ---------
 .../virtualbox-guest-additions-6.1.4-r1.ebuild     | 215 ---------
 app-emulation/virtualbox-modules/Manifest          |   4 -
 .../virtualbox-modules-5.2.32.ebuild               |  51 --
 .../virtualbox-modules-5.2.36.ebuild               |  59 ---
 .../virtualbox-modules-6.0.16-r1.ebuild            |  55 ---
 .../virtualbox-modules-6.1.4-r1.ebuild             |  55 ---
 app-emulation/virtualbox/Manifest                  |   6 -
 app-emulation/virtualbox/virtualbox-5.2.32.ebuild  | 497 --------------------
 app-emulation/virtualbox/virtualbox-5.2.36.ebuild  | 496 --------------------
 .../virtualbox/virtualbox-6.0.16-r1.ebuild         | 511 ---------------------
 .../virtualbox/virtualbox-6.1.4-r2.ebuild          | 507 --------------------
 30 files changed, 4620 deletions(-)
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2020-05-01 02:46:03 UTC
CVE-2020-2575 (https://nvd.nist.gov/vuln/detail/CVE-2020-2575):
  Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization
  (component: Core). Supported versions that are affected are Prior to 5.2.40,
  prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability
  allows high privileged attacker with logon to the infrastructure where
  Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the
  vulnerability is in Oracle VM VirtualBox, attacks may significantly impact
  additional products. Successful attacks of this vulnerability can result in
  takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality,
  Integrity and Availability impacts). CVSS Vector:
  (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
Comment 9 Andreas Sturmlechner gentoo-dev 2020-06-03 00:27:05 UTC
*** Bug 726846 has been marked as a duplicate of this bug. ***
Comment 10 NATTkA bot gentoo-dev 2020-08-08 12:21:22 UTC
Unable to check for sanity:

> no match for package: =app-emulation/virtualbox-modules-5.2.40
Comment 11 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-09-03 01:20:39 UTC
moved from https://bugs.gentoo.org/717782#c3:

CVE-2020-2742:

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

CVE-2020-2743:

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
Comment 12 NATTkA bot gentoo-dev 2020-09-09 08:13:05 UTC
Unable to check for sanity:

> no match for package: =app-emulation/virtualbox-5.2.40
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2021-01-12 17:57:43 UTC
This issue was resolved and addressed in
 GLSA 202101-09 at https://security.gentoo.org/glsa/202101-09
by GLSA coordinator Aaron Bauman (b-man).