Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.
Package | app-emulation/virtualbox on all architectures |
---|---|
Affected versions | < 5.2.36 |
Unaffected versions | >= 5.2.36 |
Package | app-emulation/virtualbox-bin on all architectures |
---|---|
Affected versions | < 5.2.36 |
Unaffected versions | >= 5.2.36 |
VirtualBox is a powerful virtualization product from Oracle.
Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.
An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts.
There is no known workaround at this time.
All VirtualBox 5.2.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.2.36"
All VirtualBox 6.0.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.0.16"
All VirtualBox 6.1.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.2"
All VirtualBox binary 5.2.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-5.2.36"
All VirtualBox binary 6.0.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-6.0.16"
All VirtualBox binary 6.1.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-6.1.2"
Release date
April 01, 2020
Latest revision
April 26, 2020: 2
Severity
normal
Exploitable
local, remote
Bugzilla entries