Mageia 2024-0316: kernel, kmod-xtables-addons & kmod-virtualbox Security Advisory Updates
Summary
Upstream kernel version 6.6.52 fixes bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.
References
- https://bugs.mageia.org/show_bug.cgi?id=33574
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.52
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
Resolution
MGASA-2024-0316 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
SRPMS
- 9/core/kernel-6.6.52-1.mga9
- 9/core/kmod-xtables-addons-3.24-62.mga9
- 9/core/kmod-virtualbox-7.0.20-54.mga9