Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.
| Package | app-emulation/virtualbox on all architectures | 
|---|---|
| Affected versions | < 5.1.32 | 
| Unaffected versions | >= 5.1.32 | 
| Package | app-emulation/virtualbox-bin on all architectures | 
|---|---|
| Affected versions | < 5.1.32.120294 | 
| Unaffected versions | >= 5.1.32.120294 | 
| Package | app-emulation/virtualbox-guest-additions on all architectures | 
|---|---|
| Affected versions | < 5.1.32 | 
| Unaffected versions | >= 5.1.32 | 
VirtualBox is a powerful virtualization product from Oracle.
Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.
An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts.
There is no known workaround at this time.
All VirtualBox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.1.32"
All VirtualBox Binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-5.1.32.120294"
All VirtualBox Guest Additions users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-guest-additions-5.1.32"
      Release date
      
      February 11, 2018
    
      Latest revision
      
      February 11, 2018: 1
    
      Severity
      
      high
    
      Exploitable
      
      local, remote
    
Bugzilla entries