GCVE-VVD-MAGEIA-2019-303
Advisory Published
Vulnetix · Advisory published October 23, 2019
This update provides the upstream 6.0.14 and fixes the following security issues: An easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox (CVE-2019-2926). An easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data (CVE-2019-2944). An easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox (CVE-2019-2984, CVE-2019-3002, CVE-2019-3005). An easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox (CVE-2019-3017). An easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox (CVE-2019-3021). An easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox (CVE-2019-3026). An easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox (CVE-2019-3028). An easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data (CVE-2019-3031).

Affected Products

VendorProductVersionsPlatforms
Mageiavirtualbox0 (affected), 6.0.14-1.mga7 (unaffected)
Mageiakmod-virtualbox0 (affected), 6.0.14-1.mga7 (unaffected)

Aliases

Transitive aliases

BDU:2021-00102EUVD-2020-22700GHSA-jf29-p6xm-2pmrVVD-CISA-2019-2926CVE-2020-2691CNVD-2020-04047VVD-CISA-2019-3031EUVD-2019-12660VVD-CISA-2020-2693CVE-2020-2911GSD-2020-2914EUVD-2020-22541VVD-CISA-2020-2705GHSA-q6j7-266g-34fqCVE-2020-2705GHSA-ww5g-r4hh-gvmhVVD-CISA-2020-2690GHSA-c5cf-6rq6-7pqrCVE-2020-2914GSD-2020-2959EUVD-2019-12583CNVD-2020-51468GHSA-6xq2-jg23-w9hhEUVD-2020-22702CNVD-2020-24427CNVD-2020-24424BDU:2020-00276BDU:2020-00283GHSA-2282-f329-v64xCNVD-2020-04050CVE-2020-2894VVD-CISA-2020-2908GHSA-rfqp-jmwx-gg9rCNVD-2019-37929CNVD-2020-04046CNVD-2020-51466GSD-2020-2911EUVD-2019-12623GHSA-r45r-rg9j-7g74CNVD-2020-04070CVE-2020-2908GSD-2020-2748GHSA-rq9q-pwjh-h293CVE-2020-2742BDU:2020-00348BDU:2020-00204BDU:2020-02368VVD-CISA-2020-2902VVD-CISA-2020-2929GSD-2020-2575VVD-CISA-2020-2914BDU:2020-02078EUVD-2019-12641CVE-2020-2681EUVD-2020-22491EUVD-2020-22498BDU:2020-00281VVD-CISA-2020-2909GHSA-m43v-j4x4-r7mpEUVD-2019-12665VVD-CISA-2020-2691EUVD-2020-22475CNVD-2020-23749EUVD-2020-22467BDU:2020-00205BDU:2020-02077VVD-CISA-2019-3021EUVD-2020-22496CVE-2020-2758BDU:2020-02369EUVD-2020-22536CVE-2020-2951CVE-2020-2704EUVD-2020-22482GHSA-f622-4fq2-v6m7GSD-2020-2929GHSA-455h-mf6x-pwmjCNVD-2020-51467GSD-2020-2692BDU:2020-00269CVE-2020-2913GSD-2020-2902GHSA-f6wx-j385-2c9hBDU:2019-03797GHSA-fccc-5pw5-5h9rCNVD-2020-04038CVE-2020-2905BDU:2020-02075VVD-CISA-2019-3005CVE-2020-2701CNVD-2020-51464EUVD-2020-22707GSD-2019-3017CVE-2020-2727CVE-2020-2910EUVD-2020-22551EUVD-2020-22701BDU:2019-03787EUVD-2019-12670BDU:2019-03805GHSA-gx8h-4x6m-jxm4CNVD-2020-04048EUVD-2020-22495GHSA-6v4v-39c2-j8j9CNVD-2020-24426CNVD-2020-04035VVD-CISA-2020-2894CVE-2020-2690CNVD-2020-04042BDU:2020-02080BDU:2020-02687CVE-2020-2678VVD-CISA-2020-2681BDU:2020-02079GHSA-832v-mqgg-q26fBDU:2019-03948CVE-2020-2689EUVD-2020-22535GHSA-wpx9-4c3x-px86EUVD-2020-22486VVD-GENTOO-2020-714064BDU:2019-03826VVD-CISA-2020-2704BDU:2020-00372VVD-MAGEIA-2020-180GHSA-87cx-954r-687pGSD-2020-2690GSD-2020-2702VVD-CISA-2020-2689EUVD-2020-22484VVD-CISA-2020-2727CVE-2020-2907EUVD-2020-22698CVE-2020-2743VVD-CISA-2019-3017VVD-CISA-2019-3002VVD-CISA-2020-2674GSD-2020-2678CNVD-2020-04051CVE-2020-2958CVE-2020-2682EUVD-2020-22483CNVD-2020-04041EUVD-2020-22368EUVD-2020-22687EUVD-2019-12565CVE-2020-2702BDU:2020-00270CNVD-2020-04043GHSA-rpm2-phfh-m9m3BDU:2020-00370EUVD-2020-22474CVE-2020-2748GHSA-mh6j-q5g3-jrhpEUVD-2019-12656GSD-2020-2701GHSA-2pmm-f975-w6hmVVD-CISA-2020-2575GSD-2020-2907EUVD-2020-22751GHSA-qfhp-872f-r5cfBDU:2019-03887VVD-CISA-2020-2725VVD-CISA-2020-2702GHSA-gfmp-h9cc-j8h6BDU:2020-02074GSD-2020-2894GSD-2020-2951GHSA-w3qw-ch2v-whr8CNVD-2020-51465VVD-CISA-2020-2958GSD-2020-2958CNVD-2019-37933CNVD-2019-37934CNVD-2019-37938CNVD-2020-23745BDU:2020-02685GSD-2019-3026CNVD-2020-04069GHSA-x86q-4558-6wjxEUVD-2020-22519VVD-CISA-2020-2692VVD-CISA-2020-2678GSD-2019-3002GHSA-325v-9p4r-7hxcVVD-CISA-2020-2905BDU:2020-02076CVE-2020-2703CVE-2020-2902EUVD-2020-22706EUVD-2020-22494BDU:2020-00271BDU:2020-00346CVE-2020-2575CNVD-2020-23400GHSA-9qv9-jp9q-c8qhVVD-CISA-2020-2758GSD-2020-2691BDU:2020-00375CNVD-2020-24430BDU:2019-03870EUVD-2020-22485BDU:2020-00656GSD-2020-2758GSD-2020-2908EUVD-2020-22704GSD-2020-2909GHSA-7jj2-8769-8qf4BDU:2020-02683GSD-2019-3021GHSA-cw94-g894-mcqhGHSA-r7mh-43r7-vh9rBDU:2019-03828GHSA-7rfx-v3c8-jg8xCNVD-2019-37935VVD-CISA-2019-3028CVE-2020-2693VVD-CISA-2020-2910BDU:2019-03807CVE-2020-2692VVD-CISA-2020-2726GHSA-rf2x-8xmx-7qcxCNVD-2020-25808VVD-CISA-2019-2984GHSA-fg57-3jwx-fwm8GHSA-4g2j-mrxv-xf4jCVE-2020-2929CNVD-2020-25530CNVD-2020-25532BDU:2020-02081GHSA-8w25-g47g-6c6xVVD-CISA-2020-2703BDU:2020-02684GSD-2020-2682GSD-2020-2727VVD-CISA-2020-2951BDU:2020-02370GHSA-g9cv-262r-m62hVVD-CISA-2020-2907GHSA-55gh-gc2p-ww4hVVD-MAGEIA-2020-65BDU:2020-00282BDU:2020-02686GHSA-xhj3-g58j-7g7vEUVD-2020-22703VVD-CISA-2020-2742EUVD-2019-12644EUVD-2020-22520BDU:2020-02682GHSA-7hpp-v2w4-jhjcGSD-2020-2726VVD-CISA-2020-2743GHSA-mx46-jh22-vrmfGHSA-f9j8-c9vv-wvpcGSD-2020-2913CNVD-2019-37936GHSA-2j93-mxgm-h8v9VVD-CISA-2020-2682CVE-2020-2959VVD-CISA-2020-2911CNVD-2020-24429EUVD-2019-12667GSD-2020-2725CVE-2020-2909EUVD-2020-22744GSD-2020-2910GHSA-qw29-j67m-632xGSD-2020-2703EUVD-2020-22695GSD-2020-2905EUVD-2020-22722VVD-GENTOO-2020-717626BDU:2020-00203BDU:2020-00280GSD-2020-2689EUVD-2020-22471BDU:2020-02689EUVD-2020-22534VVD-CISA-2019-3026CNVD-2019-37930CVE-2020-2725CNVD-2020-04040BDU:2020-02688BDU:2020-00279EUVD-2020-22518EUVD-2020-22752CNVD-2020-23746VVD-CISA-2020-2748GSD-2019-3031GHSA-xp48-jwjq-3mmcVVD-CISA-2020-2701EUVD-2020-22497GSD-2020-2693GSD-2020-2743GHSA-m4qj-fxg9-wrprGSD-2019-2944GHSA-ppjx-8528-9c77VVD-CISA-2020-2959VVD-CISA-2020-2741VVD-CISA-2020-2698CVE-2020-2741GHSA-74m7-g265-p4vcGSD-2020-2705GSD-2019-3005VVD-CISA-2019-2944CVE-2020-2726VVD-CISA-2020-2913CVE-2020-2698CVE-2020-2674GSD-2020-2698CNVD-2020-04044CNVD-2020-04049

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.