Bug 26966 - virtualbox new security issues fixed upstream in 6.0.24 and 6.1.12
Summary: virtualbox new security issues fixed upstream in 6.0.24 and 6.1.12
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2020-07-17 00:48 CEST by David Walser
Modified: 2020-08-01 01:28 CEST (History)
7 users (show)

See Also:
Source RPM: virtualbox-6.0.20-1.mga7.src.rpm, kmod-virtualbox-6.0.20-6.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2020-07-17 00:48:01 CEST
July 2020 Oracle CPU:
https://www.oracle.com/security-alerts/cpujul2020.html#AppendixOVIR

Issues fixed:
CVE-2020-14629
CVE-2020-1464[6-9]
CVE-2020-14650
CVE-2020-1467[3-7]
CVE-2020-1469[4589]
CVE-2020-1470[0347]
CVE-2020-1471[2-5]

Fixed in 6.0.24 and 6.1.12:
https://www.virtualbox.org/wiki/Changelog-6.0#v24
https://www.virtualbox.org/wiki/Changelog-6.1#v12
David Walser 2020-07-17 00:48:18 CEST

Status comment: (none) => Fixed upstream in 6.0.24 and 6.1.12
Whiteboard: (none) => MGA7TOO

Morgan Leijström 2020-07-17 10:55:52 CEST

CC: (none) => fri

Comment 1 Lewis Smith 2020-07-17 21:14:15 CEST
With our usual VB maintainer hors combat, assigning this to all or any.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2020-07-20 12:06:22 CEST
For Mageia 7, all was built but for Cauldron, I got an error (see http://pkgsubmit.mageia.org/uploads/failure/cauldron/core/release/20200720075257.ns80.duvel.10741/log/virtualbox-6.1.12-1.mga8/build.0.20200720075306.log):
"""
[...]
kmk: *** No rule to make target '/home/iurt/rpmbuild/BUILD/VirtualBox-6.1.12/src/VBox/Main/src-client/CloudGateway.cpp', needed by '/home/iurt/rpmbuild/BUILD/VirtualBox-6.1.12/out/linux.amd64/release/obj/VBoxC/src-client/CloudGateway.o'.  Stop.
kmk: *** Waiting for unfinished jobs....
[...]
kmk: *** Exiting with status 2
[...]
"""

It seems to be related to an experimental functionality:
"""
Oracle Cloud Infrastructure integration: Experimental new type of network attachment, allowing local VM to act as if it was run in cloud
"""

CC: (none) => nicolas.salguero

Comment 3 Nicolas Salguero 2020-07-21 10:25:52 CEST
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14629)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14646)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14647)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14648)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14649)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14650)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14673)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14674)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14675)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14676)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14677)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14694)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14695)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14698)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14699)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14700)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14703)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14704)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14707)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. (CVE-2020-14712)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14713)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14714)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14715)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14715
https://www.oracle.com/security-alerts/cpujul2020.html#AppendixOVIR
https://www.virtualbox.org/wiki/Changelog-6.0#v24
========================

Updated packages in core/updates_testing:
========================
virtualbox-6.0.24-1.mga7
dkms-virtualbox-6.0.24-1.mga7
virtualbox-guest-additions-6.0.24-1.mga7
dkms-vboxadditions-6.0.24-1.mga7
virtualbox-devel-6.0.24-1.mga7
python-virtualbox-6.0.24-1.mga7
virtualbox-kernel-5.6.14-desktop(586)-2.mga7-6.0.24-1.mga7
virtualbox-kernel-desktop(586)-latest-6.0.24-1.mga7
virtualbox-kernel-5.6.14-server-2.mga7-6.0.24-1.mga7
virtualbox-kernel-server-latest-6.0.24-1.mga7

from SRPMS:
virtualbox-6.0.24-1.mga7.src.rpm
kmod-virtualbox-6.0.24-1.mga7.src.rpm

Assignee: pkg-bugs => qa-bugs
Status: NEW => ASSIGNED
Source RPM: virtualbox-6.1.10-2.mga8.src.rpm => virtualbox-6.0.20-1.mga7.src.rpm, kmod-virtualbox-6.0.20-6.mga7.src.rpm
Version: Cauldron => 7
Status comment: Fixed upstream in 6.0.24 and 6.1.12 => (none)
Whiteboard: MGA7TOO => (none)

Comment 4 Thomas Andrews 2020-07-22 14:05:42 CEST
HP Probook 6550b,i3,8GB RAM, Intel video, Intel wifi, 64-bit Plasma system.

The following 3 packages are going to be installed:

- virtualbox-6.0.24-1.mga7.x86_64
- virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64
- virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64

No installation issues. The Virtualbox gui no longer offers to "Check for updates," so the extension pack had to be downloaded manually from Oracle. As usual, simply clicking on the pack brought up Vbox, and the usual procedure for updating the extension pack was successful.

All I have tried so far is my Windows XP guest. Bug 24696 is still valid, so I had to download the guest additions iso manually, and install it by putting it in a virtual optical drive. That was successful.

After a reboot, all was well. XP complained that my anti-malware database was out of date, but since I hadn't booted into XP in months, that's no surprise. Updated that, and ran a program in anticipation of my upcoming vacation that predicts the best fishing times according to the positions of the sun and moon. (Oddly enough, I've never found a Linux equivalent for this purpose.) That was successful, predicting good fishing. We'll see.

So far, vbox looks good.

CC: (none) => andrewsfarm

Comment 5 Morgan Leijström 2020-07-22 23:53:35 CEST
OK: mga7-64, Plasma, nvidia-current, 5.6.14-desktop-2.mga7
Machine Mainboard: Sabertooth P67, CPU: i7-3770, RAM 16G, Nvidia GM107 [GeForce GTX 750]
Guest: MSW7p-64

Upgraded to

- dkms-virtualbox-6.0.24-1.mga7.noarch
- virtualbox-6.0.24-1.mga7.x86_64
- virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64
- virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64

-rebooted-

Per bug Bug 18962, I install Oracle extension pack manually:

Went to
  http://download.virtualbox.org/virtualbox/6.0.24
And fetched
  Oracle_VM_VirtualBox_Extension_Pack-6.0.24.vbox-extpack 
And then
  $ sudo VBoxManage extpack install --replace that-extension-pack

From same folder also fetched
  VBoxGuestAdditions_6.0.24.iso  
And in virtualbox guest settings I selected that file for disk in the optical media.

Booted my existing MSW7p-64 guest.  Tests OK:
  Updated to that VBoxGuestAdditions_6.0.24, rebooted.
  Dynamically resizing guest window by mouse
  Shared clipboard, bidirectional
  Shared folders bidirectional copying
  USB2: flash stick and Conitec Galep5 chip programmer
  Sound, Internet, performance: playing video in Firefox while host is heavily loaded  (at very high load the sound is a bit scratchy, normal)
Comment 6 James Kerr 2020-07-23 09:51:32 CEST
on mga7-64  kernel-desktop  plasma

packages installed cleanly:
- dkms-virtualbox-6.0.24-1.mga7.noarch
- virtualbox-6.0.24-1.mga7.x86_64
- virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64
- virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64

# dkms status
virtualbox, 6.0.24-1.mga7, 5.6.14-desktop-2.mga7, x86_64: installed 
virtualbox, 6.0.24-1.mga7, 5.6.14-desktop-2.mga7, x86_64: installed-binary from 5.6.14-desktop-2.mga7

vbox and clients (mga7-32, winxp, win7) launched normally

extension pack updated cleanly

updated additions in all clients 
 
No regressions observed.

looks OK on this system:
Mobo: Dell model: 09WH54 
Card: Intel HD Graphics 530
CPU: Quad core Intel Core i7-6700 (-HT-MCP-)

CC: (none) => jim

Comment 7 William Kenney 2020-07-24 20:37:05 CEST
On real hardware, M7.1, Plasma, 64-bit

Package(s) under test:
virtualbox

default install of packages:
kernel-desktop-latest virtualbox
virtualbox-guest-additions virtualbox-kernel-desktop-latest
x11-driver-video-vboxvideo kernel-desktop-devel-latest
cpupower dkms-vboxadditions dkms-virtualbox

The following 28 packages are going to be installed:

- binutils-2.33.1-1.mga7.x86_64
- dkms-minimal-2.0.19-40.mga7.noarch
- dkms-2.0.19-40.mga7.noarch
- dkms-vboxadditions-6.0.20-1.mga7.noarch
- dkms-virtualbox-6.0.20-1.mga7.noarch
- gcc-8.4.0-1.mga7.x86_64
- gcc-cpp-8.4.0-1.mga7.x86_64
- glibc-devel-2.29-20.mga7.x86_64
- isl-0.18-1.mga7.x86_64
- kernel-desktop-devel-5.6.14-2.mga7-1-1.mga7.x86_64
- kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64
- kernel-userspace-headers-5.6.14-2.mga7.x86_64
- lib64bz2-devel-1.0.8-1.mga7.x86_64
- lib64elfutils-devel-0.176-1.mga7.x86_64
- lib64isl15-0.18-1.mga7.x86_64
- lib64lzma-devel-5.2.4-2.mga7.x86_64
- lib64mpc3-1.1.0-3.mga7.x86_64
- lib64ncurses-devel-6.1-20181117.3.1.mga7.x86_64
- lib64xcrypt-devel-4.4.6-1.mga7.x86_64
- lib64zlib-devel-1.2.11-7.mga7.x86_64
- libstdc++-devel-8.4.0-1.mga7.x86_64
- multiarch-utils-1.0.14-2.mga7.noarch
- virtualbox-6.0.20-1.mga7.x86_64
- virtualbox-guest-additions-6.0.20-1.mga7.x86_64
- virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.20-6.mga7.x86_64
- virtualbox-kernel-desktop-latest-6.0.20-6.mga7.x86_64
- x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64
- xrandr-1.5.0-2.mga7.x86_64


[root@localhost wilcal]# uname -a
Linux localhost 5.6.14-desktop-2.mga7 #1 SMP Wed May 20 23:14:20 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
[root@localhost wilcal]# urpmi kernel-desktop-latest
Package kernel-desktop-latest-5.6.14-2.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi virtualbox
Package virtualbox-6.0.20-1.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi virtualbox-guest-additions
Package virtualbox-guest-additions-6.0.20-1.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi virtualbox-kernel-desktop-latest
Package virtualbox-kernel-desktop-latest-6.0.20-6.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi x11-driver-video-vboxvideo
Package x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64 is already installed
Marking x11-driver-video-vboxvideo as manually installed, it won't be auto-orphaned
writing /var/lib/rpm/installed-through-deps.list
[root@localhost wilcal]# urpmi kernel-desktop-devel-latest
Package kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi dkms-vboxadditions
Package dkms-vboxadditions-6.0.20-1.mga7.noarch is already installed
[root@localhost wilcal]# urpmi dkms-virtualbox
Package dkms-virtualbox-6.0.20-1.mga7.noarch is already installed

[root@localhost wilcal]# urpmi cpupower
Package cpupower-5.6.14-2.mga7.x86_64 is already installed
[root@localhost wilcal]# lspci -k
00:02.0 VGA compatible controller: Intel Corporation Iris Plus Graphics G1 (Ice Lake) (rev 07)
        DeviceName: To Be Filled by O.E.M.
        Subsystem: Dell Device 097c
        Kernel driver in use: i915
        Kernel modules: i915

Mageia-8-beta1-Live-Plasma-x86_64.iso
Runs as a Vbox client.
Boots to a working desktop. Common apps work.
Screen sizes are correct.

install from updates testing:

virtualbox
virtualbox-guest-additions virtualbox-kernel-desktop-latest
x11-driver-video-vboxvideo kernel-desktop-devel-latest
cpupower dkms-vboxadditions dkms-virtualbox

The following 6 packages are going to be installed:

- dkms-vboxadditions-6.0.24-1.mga7.noarch
- dkms-virtualbox-6.0.24-1.mga7.noarch
- virtualbox-6.0.24-1.mga7.x86_64
- virtualbox-guest-additions-6.0.24-1.mga7.x86_64
- virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64
- virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64

[root@localhost wilcal]# uname -a
Linux localhost 5.6.14-desktop-2.mga7 #1 SMP Wed May 20 23:14:20 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
[root@localhost wilcal]# urpmi virtualbox
Package virtualbox-6.0.24-1.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi virtualbox-guest-additions
Package virtualbox-guest-additions-6.0.24-1.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi virtualbox-kernel-desktop-latest
Package virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi x11-driver-video-vboxvideo
Package x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi kernel-desktop-devel-latest
Package kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64 is already installed
[root@localhost wilcal]# urpmi dkms-vboxadditions
Package dkms-vboxadditions-6.0.24-1.mga7.noarch is already installed
[root@localhost wilcal]# urpmi dkms-virtualbox
Package dkms-virtualbox-6.0.24-1.mga7.noarch is already installed
[root@localhost wilcal]# urpmi cpupower
Package cpupower-5.6.14-2.mga7.x86_64 is already installed
[wilcal@localhost ~]$ lspci -k
00:02.0 VGA compatible controller: Intel Corporation Iris Plus Graphics G1 (Ice Lake) (rev 07)
        DeviceName: To Be Filled by O.E.M.
        Subsystem: Dell Device 097c
        Kernel driver in use: i915
        Kernel modules: i915


Mageia-8-beta1-Live-Plasma-x86_64.iso
Runs as a Vbox client.
Boots to a working desktop. Common apps work.
Screen sizes are correct.

Mageia-8-beta1-Live-GNOME-x86_64.iso
Runs as a Vbox client.
Boots to a working desktop. Common apps work.
Screen sizes are correct.

Mageia-8-beta1-x86_64.iso
Installs without issues
Runs as a Vbox client
Boots to a working desktop. Common apps work.
Screen sizes are correct.
Updates without error.
Reboots to a working desktop without error.

CC: (none) => wilcal.int

Comment 8 Thomas Andrews 2020-07-31 15:38:13 CEST
I ran and updated 64-bit and 32-bit Cauldron Plasma guests with no issues. One guest had over 1000 updates pending!

I see no reason not to send this one on its way, especially with all the security holes it's plugging up. Giving it an OK and validating. Extensive advisory in Comment 3.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2020-07-31 16:34:43 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 9 Mageia Robot 2020-08-01 01:28:14 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0311.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.