{"id":"MGASA-2021-0488","summary":"Updated virtualbox packages fix security vulnerabilities","details":"This update provides the upstream 6.1.28 maintenance release that fixes\nat least the following security vulnerabilities:\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.28 contains an\neasily exploitable vulnerability that allows high privileged attacker with\nlogon to the infrastructure where Oracle VM VirtualBox executes to\ncompromise Oracle VM VirtualBox. Successful attacks of this vulnerability\ncan result in unauthorized ability to cause a hang or frequently repeatable\ncrash (complete DOS) of Oracle VM VirtualBox (CVE-2021-2475, CVE-2021-35542).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.28 contains an easily\nexploitable vulnerability that allows low privileged attacker with logon to\nthe infrastructure where Oracle VM VirtualBox executes to compromise Oracle\nVM VirtualBox. Successful attacks of this vulnerability can result in\ntakeover of Oracle VM VirtualBox (CVE-2021-35538).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.28 contains an easily\nexploitable vulnerability that allows low privileged attacker with logon to\nthe infrastructure where Oracle VM VirtualBox executes to compromise Oracle\nVM VirtualBox. Successful attacks of this vulnerability can result in\nunauthorized ability to cause a hang or frequently repeatable crash\n(complete DOS) of Oracle VM VirtualBox (CVE-2021-35540).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.28 contains an easily\nexploitable vulnerability that allows high privileged attacker with logon to\nthe infrastructure where Oracle VM VirtualBox executes to compromise Oracle\nVM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks\nmay significantly impact additional products. Successful attacks of this\nvulnerability can result in unauthorized ability to cause a hang or\nfrequently repeatable crash (complete DOS) of Oracle VM VirtualBox and\nunauthorized read access to a subset of Oracle VM VirtualBox accessible\ndata (CVE-2021-35545).\n\nFor other upstream fixes in this update, see the referenced changelog.\n","modified":"2026-04-16T04:42:47.493381307Z","published":"2021-10-23T17:48:37Z","upstream":["CVE-2021-2475","CVE-2021-35538","CVE-2021-35540","CVE-2021-35542","CVE-2021-35545"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0488.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29566"},{"type":"WEB","url":"https://www.virtualbox.org/wiki/Changelog-6.1#v28"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2021.html#AppendixOVIR"}],"affected":[{"package":{"name":"virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.28-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0488.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.28-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0488.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}