July 2020 Oracle CPU: https://www.oracle.com/security-alerts/cpujul2020.html#AppendixOVIR Issues fixed: CVE-2020-14629 CVE-2020-1464[6-9] CVE-2020-14650 CVE-2020-1467[3-7] CVE-2020-1469[4589] CVE-2020-1470[0347] CVE-2020-1471[2-5] Fixed in 6.0.24 and 6.1.12: https://www.virtualbox.org/wiki/Changelog-6.0#v24 https://www.virtualbox.org/wiki/Changelog-6.1#v12
Status comment: (none) => Fixed upstream in 6.0.24 and 6.1.12Whiteboard: (none) => MGA7TOO
CC: (none) => fri
With our usual VB maintainer hors combat, assigning this to all or any.
Assignee: bugsquad => pkg-bugs
For Mageia 7, all was built but for Cauldron, I got an error (see http://pkgsubmit.mageia.org/uploads/failure/cauldron/core/release/20200720075257.ns80.duvel.10741/log/virtualbox-6.1.12-1.mga8/build.0.20200720075306.log): """ [...] kmk: *** No rule to make target '/home/iurt/rpmbuild/BUILD/VirtualBox-6.1.12/src/VBox/Main/src-client/CloudGateway.cpp', needed by '/home/iurt/rpmbuild/BUILD/VirtualBox-6.1.12/out/linux.amd64/release/obj/VBoxC/src-client/CloudGateway.o'. Stop. kmk: *** Waiting for unfinished jobs.... [...] kmk: *** Exiting with status 2 [...] """ It seems to be related to an experimental functionality: """ Oracle Cloud Infrastructure integration: Experimental new type of network attachment, allowing local VM to act as if it was run in cloud """
CC: (none) => nicolas.salguero
Suggested advisory: ======================== The updated packages fix security vulnerabilities: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14629) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14646) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14647) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14648) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14649) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14650) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14673) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14674) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14675) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14676) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14677) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14694) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14695) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14698) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14699) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14700) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14703) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. (CVE-2020-14704) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14707) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. (CVE-2020-14712) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. (CVE-2020-14713) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14714) Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. (CVE-2020-14715) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14673 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14674 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14676 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14677 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14694 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14698 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14699 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14703 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14707 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14712 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14714 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14715 https://www.oracle.com/security-alerts/cpujul2020.html#AppendixOVIR https://www.virtualbox.org/wiki/Changelog-6.0#v24 ======================== Updated packages in core/updates_testing: ======================== virtualbox-6.0.24-1.mga7 dkms-virtualbox-6.0.24-1.mga7 virtualbox-guest-additions-6.0.24-1.mga7 dkms-vboxadditions-6.0.24-1.mga7 virtualbox-devel-6.0.24-1.mga7 python-virtualbox-6.0.24-1.mga7 virtualbox-kernel-5.6.14-desktop(586)-2.mga7-6.0.24-1.mga7 virtualbox-kernel-desktop(586)-latest-6.0.24-1.mga7 virtualbox-kernel-5.6.14-server-2.mga7-6.0.24-1.mga7 virtualbox-kernel-server-latest-6.0.24-1.mga7 from SRPMS: virtualbox-6.0.24-1.mga7.src.rpm kmod-virtualbox-6.0.24-1.mga7.src.rpm
Assignee: pkg-bugs => qa-bugsStatus: NEW => ASSIGNEDSource RPM: virtualbox-6.1.10-2.mga8.src.rpm => virtualbox-6.0.20-1.mga7.src.rpm, kmod-virtualbox-6.0.20-6.mga7.src.rpmVersion: Cauldron => 7Status comment: Fixed upstream in 6.0.24 and 6.1.12 => (none)Whiteboard: MGA7TOO => (none)
HP Probook 6550b,i3,8GB RAM, Intel video, Intel wifi, 64-bit Plasma system. The following 3 packages are going to be installed: - virtualbox-6.0.24-1.mga7.x86_64 - virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64 - virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 No installation issues. The Virtualbox gui no longer offers to "Check for updates," so the extension pack had to be downloaded manually from Oracle. As usual, simply clicking on the pack brought up Vbox, and the usual procedure for updating the extension pack was successful. All I have tried so far is my Windows XP guest. Bug 24696 is still valid, so I had to download the guest additions iso manually, and install it by putting it in a virtual optical drive. That was successful. After a reboot, all was well. XP complained that my anti-malware database was out of date, but since I hadn't booted into XP in months, that's no surprise. Updated that, and ran a program in anticipation of my upcoming vacation that predicts the best fishing times according to the positions of the sun and moon. (Oddly enough, I've never found a Linux equivalent for this purpose.) That was successful, predicting good fishing. We'll see. So far, vbox looks good.
CC: (none) => andrewsfarm
OK: mga7-64, Plasma, nvidia-current, 5.6.14-desktop-2.mga7 Machine Mainboard: Sabertooth P67, CPU: i7-3770, RAM 16G, Nvidia GM107 [GeForce GTX 750] Guest: MSW7p-64 Upgraded to - dkms-virtualbox-6.0.24-1.mga7.noarch - virtualbox-6.0.24-1.mga7.x86_64 - virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64 - virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 -rebooted- Per bug Bug 18962, I install Oracle extension pack manually: Went to http://download.virtualbox.org/virtualbox/6.0.24 And fetched Oracle_VM_VirtualBox_Extension_Pack-6.0.24.vbox-extpack And then $ sudo VBoxManage extpack install --replace that-extension-pack From same folder also fetched VBoxGuestAdditions_6.0.24.iso And in virtualbox guest settings I selected that file for disk in the optical media. Booted my existing MSW7p-64 guest. Tests OK: Updated to that VBoxGuestAdditions_6.0.24, rebooted. Dynamically resizing guest window by mouse Shared clipboard, bidirectional Shared folders bidirectional copying USB2: flash stick and Conitec Galep5 chip programmer Sound, Internet, performance: playing video in Firefox while host is heavily loaded (at very high load the sound is a bit scratchy, normal)
on mga7-64 kernel-desktop plasma packages installed cleanly: - dkms-virtualbox-6.0.24-1.mga7.noarch - virtualbox-6.0.24-1.mga7.x86_64 - virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64 - virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 # dkms status virtualbox, 6.0.24-1.mga7, 5.6.14-desktop-2.mga7, x86_64: installed virtualbox, 6.0.24-1.mga7, 5.6.14-desktop-2.mga7, x86_64: installed-binary from 5.6.14-desktop-2.mga7 vbox and clients (mga7-32, winxp, win7) launched normally extension pack updated cleanly updated additions in all clients No regressions observed. looks OK on this system: Mobo: Dell model: 09WH54 Card: Intel HD Graphics 530 CPU: Quad core Intel Core i7-6700 (-HT-MCP-)
CC: (none) => jim
On real hardware, M7.1, Plasma, 64-bit Package(s) under test: virtualbox default install of packages: kernel-desktop-latest virtualbox virtualbox-guest-additions virtualbox-kernel-desktop-latest x11-driver-video-vboxvideo kernel-desktop-devel-latest cpupower dkms-vboxadditions dkms-virtualbox The following 28 packages are going to be installed: - binutils-2.33.1-1.mga7.x86_64 - dkms-minimal-2.0.19-40.mga7.noarch - dkms-2.0.19-40.mga7.noarch - dkms-vboxadditions-6.0.20-1.mga7.noarch - dkms-virtualbox-6.0.20-1.mga7.noarch - gcc-8.4.0-1.mga7.x86_64 - gcc-cpp-8.4.0-1.mga7.x86_64 - glibc-devel-2.29-20.mga7.x86_64 - isl-0.18-1.mga7.x86_64 - kernel-desktop-devel-5.6.14-2.mga7-1-1.mga7.x86_64 - kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64 - kernel-userspace-headers-5.6.14-2.mga7.x86_64 - lib64bz2-devel-1.0.8-1.mga7.x86_64 - lib64elfutils-devel-0.176-1.mga7.x86_64 - lib64isl15-0.18-1.mga7.x86_64 - lib64lzma-devel-5.2.4-2.mga7.x86_64 - lib64mpc3-1.1.0-3.mga7.x86_64 - lib64ncurses-devel-6.1-20181117.3.1.mga7.x86_64 - lib64xcrypt-devel-4.4.6-1.mga7.x86_64 - lib64zlib-devel-1.2.11-7.mga7.x86_64 - libstdc++-devel-8.4.0-1.mga7.x86_64 - multiarch-utils-1.0.14-2.mga7.noarch - virtualbox-6.0.20-1.mga7.x86_64 - virtualbox-guest-additions-6.0.20-1.mga7.x86_64 - virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.20-6.mga7.x86_64 - virtualbox-kernel-desktop-latest-6.0.20-6.mga7.x86_64 - x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64 - xrandr-1.5.0-2.mga7.x86_64 [root@localhost wilcal]# uname -a Linux localhost 5.6.14-desktop-2.mga7 #1 SMP Wed May 20 23:14:20 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-desktop-latest Package kernel-desktop-latest-5.6.14-2.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi virtualbox Package virtualbox-6.0.20-1.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi virtualbox-guest-additions Package virtualbox-guest-additions-6.0.20-1.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi virtualbox-kernel-desktop-latest Package virtualbox-kernel-desktop-latest-6.0.20-6.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi x11-driver-video-vboxvideo Package x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64 is already installed Marking x11-driver-video-vboxvideo as manually installed, it won't be auto-orphaned writing /var/lib/rpm/installed-through-deps.list [root@localhost wilcal]# urpmi kernel-desktop-devel-latest Package kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi dkms-vboxadditions Package dkms-vboxadditions-6.0.20-1.mga7.noarch is already installed [root@localhost wilcal]# urpmi dkms-virtualbox Package dkms-virtualbox-6.0.20-1.mga7.noarch is already installed [root@localhost wilcal]# urpmi cpupower Package cpupower-5.6.14-2.mga7.x86_64 is already installed [root@localhost wilcal]# lspci -k 00:02.0 VGA compatible controller: Intel Corporation Iris Plus Graphics G1 (Ice Lake) (rev 07) DeviceName: To Be Filled by O.E.M. Subsystem: Dell Device 097c Kernel driver in use: i915 Kernel modules: i915 Mageia-8-beta1-Live-Plasma-x86_64.iso Runs as a Vbox client. Boots to a working desktop. Common apps work. Screen sizes are correct. install from updates testing: virtualbox virtualbox-guest-additions virtualbox-kernel-desktop-latest x11-driver-video-vboxvideo kernel-desktop-devel-latest cpupower dkms-vboxadditions dkms-virtualbox The following 6 packages are going to be installed: - dkms-vboxadditions-6.0.24-1.mga7.noarch - dkms-virtualbox-6.0.24-1.mga7.noarch - virtualbox-6.0.24-1.mga7.x86_64 - virtualbox-guest-additions-6.0.24-1.mga7.x86_64 - virtualbox-kernel-5.6.14-desktop-2.mga7-6.0.24-1.mga7.x86_64 - virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 [root@localhost wilcal]# uname -a Linux localhost 5.6.14-desktop-2.mga7 #1 SMP Wed May 20 23:14:20 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi virtualbox Package virtualbox-6.0.24-1.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi virtualbox-guest-additions Package virtualbox-guest-additions-6.0.24-1.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi virtualbox-kernel-desktop-latest Package virtualbox-kernel-desktop-latest-6.0.24-1.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi x11-driver-video-vboxvideo Package x11-driver-video-vboxvideo-1.0.0-5.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi kernel-desktop-devel-latest Package kernel-desktop-devel-latest-5.6.14-2.mga7.x86_64 is already installed [root@localhost wilcal]# urpmi dkms-vboxadditions Package dkms-vboxadditions-6.0.24-1.mga7.noarch is already installed [root@localhost wilcal]# urpmi dkms-virtualbox Package dkms-virtualbox-6.0.24-1.mga7.noarch is already installed [root@localhost wilcal]# urpmi cpupower Package cpupower-5.6.14-2.mga7.x86_64 is already installed [wilcal@localhost ~]$ lspci -k 00:02.0 VGA compatible controller: Intel Corporation Iris Plus Graphics G1 (Ice Lake) (rev 07) DeviceName: To Be Filled by O.E.M. Subsystem: Dell Device 097c Kernel driver in use: i915 Kernel modules: i915 Mageia-8-beta1-Live-Plasma-x86_64.iso Runs as a Vbox client. Boots to a working desktop. Common apps work. Screen sizes are correct. Mageia-8-beta1-Live-GNOME-x86_64.iso Runs as a Vbox client. Boots to a working desktop. Common apps work. Screen sizes are correct. Mageia-8-beta1-x86_64.iso Installs without issues Runs as a Vbox client Boots to a working desktop. Common apps work. Screen sizes are correct. Updates without error. Reboots to a working desktop without error.
CC: (none) => wilcal.int
I ran and updated 64-bit and 32-bit Cauldron Plasma guests with no issues. One guest had over 1000 updates pending! I see no reason not to send this one on its way, especially with all the security holes it's plugging up. Giving it an OK and validating. Extensive advisory in Comment 3.
Whiteboard: (none) => MGA7-64-OKCC: (none) => sysadmin-bugsKeywords: (none) => validated_update
CC: (none) => davidwhodginsKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0311.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED