VirtualBox: Multiple vulnerabilities — GLSA 201802-01

Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.

Affected packages

app-emulation/virtualbox on all architectures
Affected versions < 5.1.32
Unaffected versions >= 5.1.32
app-emulation/virtualbox-bin on all architectures
Affected versions < 5.1.32.120294
Unaffected versions >= 5.1.32.120294
app-emulation/virtualbox-guest-additions on all architectures
Affected versions < 5.1.32
Unaffected versions >= 5.1.32

Background

VirtualBox is a powerful virtualization product from Oracle.

Description

Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.

Impact

An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts.

Workaround

There is no known workaround at this time.

Resolution

All VirtualBox users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.1.32"
 

All VirtualBox Binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-emulation/virtualbox-bin-5.1.32.120294"
 

All VirtualBox Guest Additions users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=app-emulation/virtualbox-guest-additions-5.1.32"
 

References

Release date
February 11, 2018

Latest revision
February 11, 2018: 1

Severity
high

Exploitable
local, remote

Bugzilla entries