MGASA-2024-0316 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities

Publication date: 27 Sep 2024
URL: https://advisories.mageia.org/MGASA-2024-0316.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-46713,
     CVE-2024-46734,
     CVE-2024-46735,
     CVE-2024-46736,
     CVE-2024-46737,
     CVE-2024-46738,
     CVE-2024-46739,
     CVE-2024-46740,
     CVE-2024-46741,
     CVE-2024-46742,
     CVE-2024-46743,
     CVE-2024-46744,
     CVE-2024-46745,
     CVE-2024-46746,
     CVE-2024-46747,
     CVE-2024-46749,
     CVE-2024-46750,
     CVE-2024-46752,
     CVE-2024-46755,
     CVE-2024-46756,
     CVE-2024-46757,
     CVE-2024-46758,
     CVE-2024-46759,
     CVE-2024-46760,
     CVE-2024-46761,
     CVE-2024-46762,
     CVE-2024-46763,
     CVE-2024-46765,
     CVE-2024-46767,
     CVE-2024-46768,
     CVE-2024-46770,
     CVE-2024-46771,
     CVE-2024-46773,
     CVE-2024-46776,
     CVE-2024-46777,
     CVE-2024-46780,
     CVE-2024-46781,
     CVE-2024-46782,
     CVE-2024-46783,
     CVE-2024-46784,
     CVE-2024-46785,
     CVE-2024-46786,
     CVE-2024-46787,
     CVE-2024-46788,
     CVE-2024-46791,
     CVE-2024-46794,
     CVE-2024-46795,
     CVE-2024-46796,
     CVE-2024-46797,
     CVE-2024-46798,
     CVE-2024-46800

Upstream kernel version 6.6.52 fixes bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.

References:
- https://bugs.mageia.org/show_bug.cgi?id=33574
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.52
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800

SRPMS:
- 9/core/kernel-6.6.52-1.mga9
- 9/core/kmod-xtables-addons-3.24-62.mga9
- 9/core/kmod-virtualbox-7.0.20-54.mga9

Mageia 2024-0316: kernel, kmod-xtables-addons & kmod-virtualbox Security Advisory Updates

Upstream kernel version 6.6.52 fixes bugs and vulnerabilities

Summary

Upstream kernel version 6.6.52 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links.

References

- https://bugs.mageia.org/show_bug.cgi?id=33574

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.52

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800

Resolution

MGASA-2024-0316 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities

SRPMS

- 9/core/kernel-6.6.52-1.mga9

- 9/core/kmod-xtables-addons-3.24-62.mga9

- 9/core/kmod-virtualbox-7.0.20-54.mga9

Severity
Publication date: 27 Sep 2024
URL: https://advisories.mageia.org/MGASA-2024-0316.html
Type: security
CVE: CVE-2024-46713, CVE-2024-46734, CVE-2024-46735, CVE-2024-46736, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46741, CVE-2024-46742, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46749, CVE-2024-46750, CVE-2024-46752, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46762, CVE-2024-46763, CVE-2024-46765, CVE-2024-46767, CVE-2024-46768, CVE-2024-46770, CVE-2024-46771, CVE-2024-46773, CVE-2024-46776, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46784, CVE-2024-46785, CVE-2024-46786, CVE-2024-46787, CVE-2024-46788, CVE-2024-46791, CVE-2024-46794, CVE-2024-46795, CVE-2024-46796, CVE-2024-46797, CVE-2024-46798, CVE-2024-46800

Related News