Updated virtualbox packages fix security vulnerabilities
Publication date: 27 Oct 2017Modification date: 27 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-2730 , CVE-2017-3731 , CVE-2017-3732 , CVE-2017-3733 , CVE-2017-10392 , CVE-2017-10407 , CVE-2017-10408 , CVE-2017-10428
Description
This update provides the virtualbox 5.1.30 maintenance release, fixing security and other issues: In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack (CVE-2017-3730). OpenSSL is vulnerable to a denial of service, caused by an out-of-bounds read when using a specific cipher. By sending specially crafted truncated packets, a remote attacker could exploit this vulnerability using CHACHA20/POLY1305 to cause the application to crash (CVE-2017-3731). OpenSSL could allow a remote attacker to obtain sensitive information, caused by a propagation error in the BN_mod_exp() function. An attacker could exploit this vulnerability to obtain information about the private key (CVE-2017-3732). During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected (CVE-2017-3733) A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service (CVE-2017-10392, CVE-2017-10407, CVE-2017-10408). A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and partially deny service (CVE-2017-10428). For other fixes in this update see the referenced changelog.
References
- https://bugs.mageia.org/show_bug.cgi?id=21901
- https://www.virtualbox.org/wiki/Changelog-5.1#v30
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10392
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10407
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10408
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10428
SRPMS
5/core
- virtualbox-5.1.30-1.mga5
- kmod-vboxadditions-5.1.30-1.mga5
- kmod-virtualbox-5.1.30-1.mga5
6/core
- virtualbox-5.1.30-1.mga6
- kmod-vboxadditions-5.1.30-1.mga6
- kmod-virtualbox-5.1.30-1.mga6