![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.853812 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for virtualbox (openSUSE-SU-2021:0723-1) |
Summary: | The remote host is missing an update for the 'virtualbox'; package(s) announced via the openSUSE-SU-2021:0723-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'virtualbox' package(s) announced via the openSUSE-SU-2021:0723-1 advisory. Vulnerability Insight: This update for virtualbox fixes the following issues: virtualbox was updated to 6.1.22 (released April 29 2021 by Oracle) This is a maintenance release. The following items were fixed and/or added: - VMM: Improved performance of 64-bit Windows and Solaris guests when Hyper-V is used on recent Windows 10 hosts - VMM: Fixed frequent crashes of 64-bit Windows Vista and Server 2003 guests when Hyper-V is used - GUI: Fixed regression where user was not able to save unset default shortcuts (bug #20305) - Storage: Fixed regression in LsiLogic SAS controller emulation caused VM crash (bug #20323) - Linux Guest Additions: Fixed issue when it was not possible to run executables from mounted share (bug #20320) - Fixes for CVE-2021-2145 CVE-2021-2250 CVE-2021-2264 CVE-2021-2266 CVE-2021-2279 CVE-2021-2280 CVE-2021-2281 CVE-2021-2282 CVE-2021-2283 CVE-2021-2284 CVE-2021-2285 CVE-2021-2286 CVE-2021-2287 CVE-2021-2291 CVE-2021-2296 CVE-2021-2297 CVE-2021-2306 CVE-2021-2309 CVE-2021-2310 CVE-2021-2312 - Version bump to (released April 20 2021 by Oracle) File 'virtualbox-kmp-files-leap' is deleted. - Use distconfdir for xinitrc.d files on TW - Improve autostart security boo#1182918. Affected Software/OS: 'virtualbox' package(s) on openSUSE Leap 15.2. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-2145 https://security.gentoo.org/glsa/202208-36 https://www.zerodayinitiative.com/advisories/ZDI-21-455/ https://www.oracle.com/security-alerts/cpuapr2021.html Common Vulnerability Exposure (CVE) ID: CVE-2021-2250 https://www.zerodayinitiative.com/advisories/ZDI-21-484/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2264 http://www.openwall.com/lists/oss-security/2021/04/26/1 http://www.openwall.com/lists/oss-security/2021/04/26/2 Common Vulnerability Exposure (CVE) ID: CVE-2021-2266 Common Vulnerability Exposure (CVE) ID: CVE-2021-2279 https://www.zerodayinitiative.com/advisories/ZDI-21-453/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2280 Common Vulnerability Exposure (CVE) ID: CVE-2021-2281 Common Vulnerability Exposure (CVE) ID: CVE-2021-2282 Common Vulnerability Exposure (CVE) ID: CVE-2021-2283 Common Vulnerability Exposure (CVE) ID: CVE-2021-2284 Common Vulnerability Exposure (CVE) ID: CVE-2021-2285 Common Vulnerability Exposure (CVE) ID: CVE-2021-2286 Common Vulnerability Exposure (CVE) ID: CVE-2021-2287 Common Vulnerability Exposure (CVE) ID: CVE-2021-2291 https://www.zerodayinitiative.com/advisories/ZDI-21-457/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2296 https://www.zerodayinitiative.com/advisories/ZDI-21-459/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2297 https://www.zerodayinitiative.com/advisories/ZDI-21-462/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2306 Common Vulnerability Exposure (CVE) ID: CVE-2021-2309 https://www.zerodayinitiative.com/advisories/ZDI-21-461/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2310 https://www.zerodayinitiative.com/advisories/ZDI-21-456/ Common Vulnerability Exposure (CVE) ID: CVE-2021-2312 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |