![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2016.0259 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2016-0259) |
Resumen: | The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2016-0259 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2016-0259 advisory. Vulnerability Insight: This update provides the new VirtualBox 5.1 series, currently based on 5.1.2 providing several performance enhancements The highlights include: * VMM: new APIC and I/O APIC implementations that result in significantly improved performance in certain situations (for example with networking) * VMM: activate the x2APIC by default for Linux guests * VMM: added support for Hyper-V paravirtualized debugging of Windows guests * VMM: emulate even more MMIO and shadow pagetable exits without going back to user mode * GUI: overall migration to Qt5 * GUI: passive API event listener improving the VM GUI performance and response time * Audio: added HDA (High Definition Audio) support for newer Linux guests * Audio: added on-demand timers which should improve the overall performance and reduce the CPU consumption * Audio: more fine-grained volume control for the AC'97 emulation, which now also takes the master volume control into account * better support for Python 3 It also resolves the following security issue: Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.26 allows local users to affect availability via vectors related to Core (CVE-2016-3597). For other fixes, see the referenced changelog. Affected Software/OS: 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-3597 BugTraq ID: 91787 http://www.securityfocus.com/bid/91787 BugTraq ID: 91864 http://www.securityfocus.com/bid/91864 http://www.securitytracker.com/id/1036384 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |