{"id":"MGASA-2022-0153","summary":"Updated virtualbox packages fix security vulnerabilities","details":"Updated virtualbox packages fix security vulnerabilities:\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.34 contains an\neasily exploitable vulnerability that allows a high privileged attacker\nwith logon to the infrastructure where Oracle VM VirtualBox executes to\ncompromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM\nVirtualBox, attacks may significantly impact additional products (scope\nchange). Successful attacks of this vulnerability can result in\nunauthorized ability to cause a hang or frequently repeatable crash\n(complete DOS) of Oracle VM VirtualBox as well as unauthorized update,\ninsert or delete access to some of Oracle VM VirtualBox accessible data\n(CVE-2022-21465).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.34 contains an\neasily exploitable vulnerability that allows a low privileged attacker\nwith logon to the infrastructure where Oracle VM VirtualBox executes to\ncompromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM\nVirtualBox, attacks may significantly impact additional products (scope\nchange). Successful attacks of this vulnerability can result in\nunauthorized ability to cause a hang or frequently repeatable crash\n(complete DOS) of Oracle VM VirtualBox (CVE-2022-21471).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.34 contains an \neasily exploitable vulnerability that allows a low privileged attacker\nwith logon to the infrastructure where Oracle VM VirtualBox executes to\ncompromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM\nVirtualBox, attacks may significantly impact additional products (scope\nchange). Successful attacks of this vulnerability can result in\nunauthorized read access to a subset of Oracle VM VirtualBox accessible\ndata (CVE-2022-21487).\n\nVulnerability in the Oracle VM VirtualBox prior to 6.1.34 contains an\neasily exploitable vulnerability that allows a low privileged attacker\nwith logon to the infrastructure where Oracle VM VirtualBox executes to\ncompromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM\nVirtualBox, attacks may significantly impact additional products (scope\nchange). Successful attacks of this vulnerability can result in\nunauthorized update, insert or delete access to some of Oracle VM\nVirtualBox accessible data (CVE-2022-21488).\n\nFor other fixes in this update, see the referenced changelog.\n","modified":"2026-04-16T04:44:36.199861438Z","published":"2022-04-26T15:04:20Z","upstream":["CVE-2022-21465","CVE-2022-21471","CVE-2022-21487","CVE-2022-21488"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0153.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30302"},{"type":"WEB","url":"https://www.virtualbox.org/wiki/Changelog-6.1#v34"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixOVIR"}],"affected":[{"package":{"name":"virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.34-1.2.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0153.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.34-1.2.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0153.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}