Update Virtualbox Guest Additions to 5.2.22, security fix version
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2018-a7988e4520
Please log in to add feedback.
This update has been submitted for testing by sergiomb.
Hi Sergio,
could you please make transparent to us, why Update Virtualbox Guest Additions to 5.2.22 is called a security fix.
VirtualBox 5.2.22 (released November 09 2018)
This is a maintenance release. The following items were fixed and/or added:
Thank you very much in advance.
Best regards, Dankmar
This just hit Slashdot: "According to a text file uploaded on GitHub, Saint Petersburg-based researcher Sergey Zelenyuk has found a chain of bugs that can allow malicious code to escape the VirtualBox virtual machine (the guest OS) and execute on the underlying (host) operating system."
One example article: https://www.zdnet.com/article/virtualbox-zero-day-published-by-disgruntled-researcher/
Slashdot: https://developers.slashdot.org/story/18/11/10/1739206/disgruntled-security-researcher-publishes-major-virtualbox-0-day-exploit
His github repo has the technical details. He shows how you can create a console shell to start on the host by using a buffer overrun in the guest: https://github.com/MorteNoir1/virtualbox_e1000_0day
The "disgruntled security researcher" part is difficult to read and understand due to broken English. More info is available on his github page.
This update has been pushed to testing.
Works great! LGTM! =)
no regressions noted
Works
This update has been submitted for batched by bodhi.
This update has been submitted for stable by bodhi.
This update has been pushed to stable.