MGASA-2024-0277 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities

Publication date: 07 Aug 2024
URL: https://advisories.mageia.org/MGASA-2024-0277.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-42068,
     CVE-2024-42067,
     CVE-2024-42145,
     CVE-2024-42154,
     CVE-2024-42153,
     CVE-2024-42152,
     CVE-2024-42148,
     CVE-2024-42230,
     CVE-2024-42229,
     CVE-2024-42228,
     CVE-2024-42226,
     CVE-2024-42225,
     CVE-2024-42147,
     CVE-2024-42224,
     CVE-2024-42223,
     CVE-2024-42161,
     CVE-2024-42160,
     CVE-2024-42159,
     CVE-2024-42157,
     CVE-2024-42110,
     CVE-2024-42119,
     CVE-2024-42116,
     CVE-2024-42115,
     CVE-2024-42144,
     CVE-2024-42143,
     CVE-2024-42142,
     CVE-2024-42141,
     CVE-2024-42140,
     CVE-2024-42113,
     CVE-2024-42138,
     CVE-2024-42137,
     CVE-2024-42136,
     CVE-2024-42135,
     CVE-2024-42133,
     CVE-2024-42132,
     CVE-2024-42131,
     CVE-2024-42130,
     CVE-2024-42128,
     CVE-2024-42127,
     CVE-2024-42126,
     CVE-2024-42124,
     CVE-2024-42121,
     CVE-2024-42120,
     CVE-2023-52888,
     CVE-2024-42106,
     CVE-2024-42105,
     CVE-2024-42104,
     CVE-2024-42103,
     CVE-2024-42102,
     CVE-2024-42101,
     CVE-2024-42100,
     CVE-2024-42109,
     CVE-2024-40947,
     CVE-2024-42226,
     CVE-2024-41056,
     CVE-2024-41053,
     CVE-2024-41055,
     CVE-2024-41054,
     CVE-2024-41032,
     CVE-2024-41031,
     CVE-2024-41030,
     CVE-2024-41028,
     CVE-2024-41027,
     CVE-2024-41052,
     CVE-2024-41051,
     CVE-2024-41050,
     CVE-2024-41049,
     CVE-2024-41048,
     CVE-2024-41047,
     CVE-2024-41046,
     CVE-2024-41044,
     CVE-2024-41025,
     CVE-2024-41041,
     CVE-2024-41040,
     CVE-2024-41039,
     CVE-2024-41038,
     CVE-2024-41037,
     CVE-2024-41036,
     CVE-2024-41035,
     CVE-2024-41034,
     CVE-2024-41024,
     CVE-2024-41081,
     CVE-2024-41078,
     CVE-2024-41079,
     CVE-2024-41076,
     CVE-2024-41075,
     CVE-2024-41074,
     CVE-2024-41073,
     CVE-2024-41072,
     CVE-2024-41070,
     CVE-2024-41069,
     CVE-2024-41077,
     CVE-2024-41068,
     CVE-2024-41066,
     CVE-2024-41065,
     CVE-2024-41064,
     CVE-2024-41063,
     CVE-2024-41062,
     CVE-2024-41060,
     CVE-2024-41059,
     CVE-2024-41057,
     CVE-2024-41058,
     CVE-2024-41022,
     CVE-2024-41020,
     CVE-2024-41019,
     CVE-2024-41018,
     CVE-2024-41017,
     CVE-2024-41015,
     CVE-2024-41090,
     CVE-2024-41091

Upstream kernel version 6.6.43 fix bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.

References:
- https://bugs.mageia.org/show_bug.cgi?id=33446
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091

SRPMS:
- 9/core/kernel-6.6.43-1.mga9
- 9/core/kmod-xtables-addons-3.24-60.mga9
- 9/core/kmod-virtualbox-7.0.20-52.mga9

Mageia 2024-0277: kernel, kmod-xtables-addons & kmod-virtualbox Security Advisory Updates

Upstream kernel version 6.6.43 fix bugs and vulnerabilities

Summary

Upstream kernel version 6.6.43 fix bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links.

References

- https://bugs.mageia.org/show_bug.cgi?id=33446

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091

Resolution

MGASA-2024-0277 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities

SRPMS

- 9/core/kernel-6.6.43-1.mga9

- 9/core/kmod-xtables-addons-3.24-60.mga9

- 9/core/kmod-virtualbox-7.0.20-52.mga9

Severity
Publication date: 07 Aug 2024
URL: https://advisories.mageia.org/MGASA-2024-0277.html
Type: security
CVE: CVE-2024-42068, CVE-2024-42067, CVE-2024-42145, CVE-2024-42154, CVE-2024-42153, CVE-2024-42152, CVE-2024-42148, CVE-2024-42230, CVE-2024-42229, CVE-2024-42228, CVE-2024-42226, CVE-2024-42225, CVE-2024-42147, CVE-2024-42224, CVE-2024-42223, CVE-2024-42161, CVE-2024-42160, CVE-2024-42159, CVE-2024-42157, CVE-2024-42110, CVE-2024-42119, CVE-2024-42116, CVE-2024-42115, CVE-2024-42144, CVE-2024-42143, CVE-2024-42142, CVE-2024-42141, CVE-2024-42140, CVE-2024-42113, CVE-2024-42138, CVE-2024-42137, CVE-2024-42136, CVE-2024-42135, CVE-2024-42133, CVE-2024-42132, CVE-2024-42131, CVE-2024-42130, CVE-2024-42128, CVE-2024-42127, CVE-2024-42126, CVE-2024-42124, CVE-2024-42121, CVE-2024-42120, CVE-2023-52888, CVE-2024-42106, CVE-2024-42105, CVE-2024-42104, CVE-2024-42103, CVE-2024-42102, CVE-2024-42101, CVE-2024-42100, CVE-2024-42109, CVE-2024-40947, CVE-2024-42226, CVE-2024-41056, CVE-2024-41053, CVE-2024-41055, CVE-2024-41054, CVE-2024-41032, CVE-2024-41031, CVE-2024-41030, CVE-2024-41028, CVE-2024-41027, CVE-2024-41052, CVE-2024-41051, CVE-2024-41050, CVE-2024-41049, CVE-2024-41048, CVE-2024-41047, CVE-2024-41046, CVE-2024-41044, CVE-2024-41025, CVE-2024-41041, CVE-2024-41040, CVE-2024-41039, CVE-2024-41038, CVE-2024-41037, CVE-2024-41036, CVE-2024-41035, CVE-2024-41034, CVE-2024-41024, CVE-2024-41081, CVE-2024-41078, CVE-2024-41079, CVE-2024-41076, CVE-2024-41075, CVE-2024-41074, CVE-2024-41073, CVE-2024-41072, CVE-2024-41070, CVE-2024-41069, CVE-2024-41077, CVE-2024-41068, CVE-2024-41066, CVE-2024-41065, CVE-2024-41064, CVE-2024-41063, CVE-2024-41062, CVE-2024-41060, CVE-2024-41059, CVE-2024-41057, CVE-2024-41058, CVE-2024-41022, CVE-2024-41020, CVE-2024-41019, CVE-2024-41018, CVE-2024-41017, CVE-2024-41015, CVE-2024-41090, CVE-2024-41091

Related News