opensuse-su-2024:0364-1
Vulnerability from csaf_opensuse
Published
2024-11-10 09:55
Modified
2024-11-10 09:55
Summary
Security update for virtualbox
Notes
Title of the patch
Security update for virtualbox
Description of the patch
This update for virtualbox fixes the following issues:
Update to release 7.1.4:
* NAT: Fixed DHCP problems with certain guests when domain is
empty
* VMSVGA: Improved flickering, black screen and other screen
update issues with recent Linux kernels
* Linux Guest Additions: Introduce initial support for kernel 6.12
* EFI: Added missing LsiLogic MPT SCSI driver again to fix
booting from devices attached to this device if the EFI
firmware is used (7.1.0 regression)
* EFI: Restored broken network boot support (7.1.0 regression)
* Adressed CVE-2024-21248 [boo#1231735],
CVE-2024-21273 [boo#1231736], CVE-2024-21259 [boo#1231737],
CVE-2024-21263 [boo#1231738]
- Make the Extension Pack work with our compiler flags and RT_NOEXCEPT choices. [boo#1231225]
Update to release 7.1:
* The GUI now offers a selection between Basic and Experienced
user level with reduced or full UI functionality.
* VRDE: If user does not set up TLS with custom certificates,
enable it with self-signed certificate, including issuing a
new one before the old one expires
* NAT: New engine with IPv6 support.
* Linux host and guest: Added Wayland support for Clipboard
sharing.
- Changed license from Gpl-2.0 to Gpl-3.0
Version bump to VirtualBox 7.0.20 (released July 16 2024 by Oracle))
This is a maintenance release. The following items were fixed and/or added:
- TPM: Fixed errors appearing the event viewer with Windows guests
- macOS Hosts: Fixed passing USB devices to the VM (bug #21218)
- Audio: Fixed recording with HDA emulation after newer Windows 10 / 11 guests got rebooted
- USB: Fixed a deadlock in OHCI triggered when saving the current state of a VM or taking a snapshot (bug #22059)
- Linux Guest and Host: Introduced initial support for OpenSuse 15.6 kernel
- Linux Guest and Host: Introduced initial support for RHEL 9.5 kernel (bug #22099)
- Guest Additions: Shared Clipboard: Fixed issue when extra new lines were pasted when copying text between Win and X11 (bug #21716)
- UEFI Secure Boot: Add new Microsoft certificates to list for new VMs
Patchnames
openSUSE-2024-364
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for virtualbox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for virtualbox fixes the following issues:\n\nUpdate to release 7.1.4:\n\n* NAT: Fixed DHCP problems with certain guests when domain is\n empty\n* VMSVGA: Improved flickering, black screen and other screen\n update issues with recent Linux kernels\n* Linux Guest Additions: Introduce initial support for kernel 6.12\n* EFI: Added missing LsiLogic MPT SCSI driver again to fix\n booting from devices attached to this device if the EFI\n firmware is used (7.1.0 regression)\n* EFI: Restored broken network boot support (7.1.0 regression)\n* Adressed CVE-2024-21248 [boo#1231735],\n CVE-2024-21273 [boo#1231736], CVE-2024-21259 [boo#1231737],\n CVE-2024-21263 [boo#1231738]\n\n- Make the Extension Pack work with our compiler flags and RT_NOEXCEPT choices. [boo#1231225]\n\nUpdate to release 7.1:\n\n* The GUI now offers a selection between Basic and Experienced\n user level with reduced or full UI functionality.\n* VRDE: If user does not set up TLS with custom certificates,\n enable it with self-signed certificate, including issuing a\n new one before the old one expires\n* NAT: New engine with IPv6 support.\n* Linux host and guest: Added Wayland support for Clipboard\n sharing.\n\n- Changed license from Gpl-2.0 to Gpl-3.0\n\nVersion bump to VirtualBox 7.0.20 (released July 16 2024 by Oracle))\n\nThis is a maintenance release. The following items were fixed and/or added:\n\n- TPM: Fixed errors appearing the event viewer with Windows guests\n- macOS Hosts: Fixed passing USB devices to the VM (bug #21218)\n- Audio: Fixed recording with HDA emulation after newer Windows 10 / 11 guests got rebooted\n- USB: Fixed a deadlock in OHCI triggered when saving the current state of a VM or taking a snapshot (bug #22059)\n- Linux Guest and Host: Introduced initial support for OpenSuse 15.6 kernel\n- Linux Guest and Host: Introduced initial support for RHEL 9.5 kernel (bug #22099)\n- Guest Additions: Shared Clipboard: Fixed issue when extra new lines were pasted when copying text between Win and X11 (bug #21716)\n- UEFI Secure Boot: Add new Microsoft certificates to list for new VMs \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-364",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0364-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0364-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELCE6LNULD7SDN6FX3HW5773W3KTCWXS/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0364-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELCE6LNULD7SDN6FX3HW5773W3KTCWXS/"
},
{
"category": "self",
"summary": "SUSE Bug 1231225",
"url": "https://bugzilla.suse.com/1231225"
},
{
"category": "self",
"summary": "SUSE Bug 1231735",
"url": "https://bugzilla.suse.com/1231735"
},
{
"category": "self",
"summary": "SUSE Bug 1231736",
"url": "https://bugzilla.suse.com/1231736"
},
{
"category": "self",
"summary": "SUSE Bug 1231737",
"url": "https://bugzilla.suse.com/1231737"
},
{
"category": "self",
"summary": "SUSE Bug 1231738",
"url": "https://bugzilla.suse.com/1231738"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21248 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21259 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21263 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21273 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21273/"
}
],
"title": "Security update for virtualbox",
"tracking": {
"current_release_date": "2024-11-10T09:55:36Z",
"generator": {
"date": "2024-11-10T09:55:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0364-1",
"initial_release_date": "2024-11-10T09:55:36Z",
"revision_history": [
{
"date": "2024-11-10T09:55:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"product": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"product": {
"name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"product_id": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"product": {
"name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"product_id": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"product": {
"name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"product_id": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"product": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"product": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"product_id": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"product_id": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"product_id": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"product": {
"name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"product_id": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP6",
"product": {
"name": "SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64"
},
"product_reference": "kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch"
},
"product_reference": "virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
},
"product_reference": "virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21248"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21248",
"url": "https://www.suse.com/security/cve/CVE-2024-21248"
},
{
"category": "external",
"summary": "SUSE Bug 1231735 for CVE-2024-21248",
"url": "https://bugzilla.suse.com/1231735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-10T09:55:36Z",
"details": "moderate"
}
],
"title": "CVE-2024-21248"
},
{
"cve": "CVE-2024-21259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21259"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21259",
"url": "https://www.suse.com/security/cve/CVE-2024-21259"
},
{
"category": "external",
"summary": "SUSE Bug 1231737 for CVE-2024-21259",
"url": "https://bugzilla.suse.com/1231737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-10T09:55:36Z",
"details": "important"
}
],
"title": "CVE-2024-21259"
},
{
"cve": "CVE-2024-21263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21263"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21263",
"url": "https://www.suse.com/security/cve/CVE-2024-21263"
},
{
"category": "external",
"summary": "SUSE Bug 1231738 for CVE-2024-21263",
"url": "https://bugzilla.suse.com/1231738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-10T09:55:36Z",
"details": "moderate"
}
],
"title": "CVE-2024-21263"
},
{
"cve": "CVE-2024-21273",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21273"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21273",
"url": "https://www.suse.com/security/cve/CVE-2024-21273"
},
{
"category": "external",
"summary": "SUSE Bug 1231736 for CVE-2024-21273",
"url": "https://bugzilla.suse.com/1231736"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"SUSE Package Hub 15 SP6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"SUSE Package Hub 15 SP6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"SUSE Package Hub 15 SP6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"SUSE Package Hub 15 SP6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.aarch64",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.ppc64le",
"openSUSE Leap 15.6:kbuild-0.1.9998+svn3613-bp156.2.3.1.x86_64",
"openSUSE Leap 15.6:python3-virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-devel-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-guest-desktop-icons-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-guest-tools-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-host-source-7.1.4-lp156.2.4.1.noarch",
"openSUSE Leap 15.6:virtualbox-kmp-default-7.1.4_k6.4.0_150600.23.25-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-qt-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-vnc-7.1.4-lp156.2.4.1.x86_64",
"openSUSE Leap 15.6:virtualbox-websrv-7.1.4-lp156.2.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-11-10T09:55:36Z",
"details": "moderate"
}
],
"title": "CVE-2024-21273"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…