Mageia 2019-0179: virtualbox security update
Summary
This update provies Virtualbox 6.0.8 that fixes the Microarchitectural
Data Sampling (MDS, also called ZombieLoad attack) vulnerabilities in
Intel processors that can allow attackers to retrieve data being
processed inside a CPU.
The fixed / mitigated issues are:
Modern Intel microprocessors implement hardware-level micro-optimizations
to improve the performance of writing data back to CPU caches. The write
operation is split into STA (STore Address) and STD (STore Data)
sub-operations. These sub-operations allow the processor to hand-off
address generation logic into these sub-operations for optimized writes.
Both of these sub-operations write to a shared distributed processor
structure called the 'processor store buffer'. As a result, an
unprivileged attacker could use this flaw to read private data resident
within the CPU's processor store buffer. (CVE-2018-12126)
Microprocessors use a ‘load port’ subcomponent to perform load operations
from memory or IO. During a load oper...
References
- https://bugs.mageia.org/show_bug.cgi?id=24831
- https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html
- https://www.virtualbox.org/wiki/Changelog-6.0#v8
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091
Resolution
MGASA-2019-0179 - Updated virtualbox packages fix security vulnerabilities
SRPMS
- 6/core/virtualbox-6.0.8-1.mga6
- 6/core/kmod-vboxadditions-6.0.8-1.mga6
- 6/core/kmod-virtualbox-6.0.8-1.mga6