CVE-2022-21465: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H). CVE-2022-21471: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). CVE-2022-21487: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N). CVE-2022-21488: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N). Please bump to 6.1.34.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b36fb9da30b73e71e69c72038fa3d366984514e8 commit b36fb9da30b73e71e69c72038fa3d366984514e8 Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2022-04-22 07:10:17 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2022-04-22 07:20:10 +0000 virtualbox packages: Bump to version 6.1.34 Bug: https://bugs.gentoo.org/839990 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> app-emulation/virtualbox-additions/Manifest | 1 + .../virtualbox-additions-6.1.34.ebuild | 34 ++ app-emulation/virtualbox-extpack-oracle/Manifest | 1 + .../virtualbox-extpack-oracle-6.1.34.ebuild | 41 ++ app-emulation/virtualbox-guest-additions/Manifest | 1 + .../virtualbox-guest-additions-6.1.34.ebuild | 221 +++++++++ app-emulation/virtualbox-modules/Manifest | 1 + .../virtualbox-modules-6.1.34.ebuild | 67 +++ app-emulation/virtualbox/Manifest | 1 + .../files/virtualbox-6.1.34-vboxr0.patch | 20 + app-emulation/virtualbox/virtualbox-6.1.34.ebuild | 505 +++++++++++++++++++++ 11 files changed, 893 insertions(+)
Thanks! Please stabilize when ready.
Fails to build.... emerge: there are no ebuilds to satisfy "dev-java/openjdk-bin:17[gentoo-vm(+),headless-awt=]". (dependency required by "virtual/jdk-17::gentoo" [ebuild]) (dependency required by "app-emulation/virtualbox-6.1.34-r1::gentoo[java]" [ebuild]) (dependency required by "app-emulation/virtualbox-extpack-oracle-6.1.34::gentoo" [ebuild]) (dependency required by "@selected" [set]) (dependency required by "@world" [argument]) dependency on virtual/jdk:17
(In reply to Nico Baggus from comment #3) > Fails to build.... > > > emerge: there are no ebuilds to satisfy > "dev-java/openjdk-bin:17[gentoo-vm(+),headless-awt=]". > (dependency required by "virtual/jdk-17::gentoo" [ebuild]) > (dependency required by "app-emulation/virtualbox-6.1.34-r1::gentoo[java]" > [ebuild]) > (dependency required by > "app-emulation/virtualbox-extpack-oracle-6.1.34::gentoo" [ebuild]) > (dependency required by "@selected" [set]) > (dependency required by "@world" [argument]) > > dependency on virtual/jdk:17 That's not a build failure, and this is not the right venue for getting support for build/emerge dep problems. Please try forums or IRC.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=0896f6d0ef51a24e9d845d2ac349c6bf98fadb0b commit 0896f6d0ef51a24e9d845d2ac349c6bf98fadb0b Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2022-08-31 23:36:15 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2022-08-31 23:37:06 +0000 [ GLSA 202208-36 ] Oracle VirtualBox: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/785445 Bug: https://bugs.gentoo.org/803134 Bug: https://bugs.gentoo.org/820425 Bug: https://bugs.gentoo.org/831440 Bug: https://bugs.gentoo.org/839990 Bug: https://bugs.gentoo.org/859391 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Sam James <sam@gentoo.org> glsa-202208-36.xml | 98 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 98 insertions(+)
Maintainer, please cleanup and use the Closes tag in your commit as GLSA is done.
The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d66719f5cd1476433e895d82059c431688d40914 commit d66719f5cd1476433e895d82059c431688d40914 Author: Viorel Munteanu <ceamac.paragon@gmail.com> AuthorDate: 2022-09-01 08:08:17 +0000 Commit: Joonas Niilola <juippis@gentoo.org> CommitDate: 2022-09-05 12:39:17 +0000 app-emulation/virtualbox: drop versions Closes: https://bugs.gentoo.org/839990 Closes: https://bugs.gentoo.org/859391 Signed-off-by: Viorel Munteanu <ceamac.paragon@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/27149 Signed-off-by: Joonas Niilola <juippis@gentoo.org> app-emulation/virtualbox/Manifest | 3 - .../files/virtualbox-6.1.34-no-pam.patch | 22 - .../files/virtualbox-6.1.34-python3.10.patch | 13 - .../files/virtualbox-6.1.34-r3-python3.10.patch | 122 ---- .../files/virtualbox-6.1.34-vboxr0.patch | 20 - .../virtualbox/virtualbox-6.1.32-r3.ebuild | 517 ---------------- .../virtualbox/virtualbox-6.1.34-r1.ebuild | 506 ---------------- .../virtualbox/virtualbox-6.1.34-r3.ebuild | 535 ----------------- .../virtualbox/virtualbox-6.1.34-r7.ebuild | 636 -------------------- app-emulation/virtualbox/virtualbox-6.1.36.ebuild | 647 --------------------- 10 files changed, 3021 deletions(-)