MGASA-2024-0392 - Updated kernel, kmod-xtables-addons, kmod-virtualbox & dwarves packages fix security vulnerabilities

Publication date: 18 Dec 2024
URL: https://advisories.mageia.org/MGASA-2024-0392.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2024-53079,
     CVE-2024-53091,
     CVE-2024-53093,
     CVE-2024-53094,
     CVE-2024-53095,
     CVE-2024-53097,
     CVE-2024-53099,
     CVE-2024-53100,
     CVE-2024-53101,
     CVE-2024-53102,
     CVE-2024-53106,
     CVE-2024-53108,
     CVE-2024-53109,
     CVE-2024-53110,
     CVE-2024-53112,
     CVE-2024-53113,
     CVE-2024-53119,
     CVE-2024-53120,
     CVE-2024-53121,
     CVE-2024-53122,
     CVE-2024-53123,
     CVE-2024-53126,
     CVE-2024-53127,
     CVE-2024-53129,
     CVE-2024-53130,
     CVE-2024-53131,
     CVE-2024-53134,
     CVE-2024-53135,
     CVE-2024-53136,
     CVE-2024-53138,
     CVE-2024-53139,
     CVE-2024-53140

Upstream kernel version 6.6.65 fixes bugs and vulnerabilities.
The kmod-virtualbox and kmod-xtables-addons packages have been
updated to work with this new kernel.
For information about the vulnerabilities see the links.

References:
- https://bugs.mageia.org/show_bug.cgi?id=33845
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.62
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.63
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.64
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.65
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53134
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53139
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53140

SRPMS:
- 9/core/kernel-6.6.65-2.mga9
- 9/core/kmod-xtables-addons-3.24-69.mga9
- 9/core/kmod-virtualbox-7.0.20-61.mga9
- 9/core/dwarves-1.28-1.mga9

Mageia 2024-0392: kernel, kmod-xtables-addons, kmod-virtualbox & dwarves Security Advisory Updates

Upstream kernel version 6.6.65 fixes bugs and vulnerabilities

Summary

Upstream kernel version 6.6.65 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links.

References

- https://bugs.mageia.org/show_bug.cgi?id=33845

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.62

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.63

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.64

- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.65

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53091

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53094

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53099

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53102

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53108

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53109

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53126

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53127

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53129

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53134

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53139

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53140

Resolution

MGASA-2024-0392 - Updated kernel, kmod-xtables-addons, kmod-virtualbox & dwarves packages fix security vulnerabilities

SRPMS

- 9/core/kernel-6.6.65-2.mga9

- 9/core/kmod-xtables-addons-3.24-69.mga9

- 9/core/kmod-virtualbox-7.0.20-61.mga9

- 9/core/dwarves-1.28-1.mga9

Severity
Publication date: 18 Dec 2024
URL: https://advisories.mageia.org/MGASA-2024-0392.html
Type: security
CVE: CVE-2024-53079, CVE-2024-53091, CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53097, CVE-2024-53099, CVE-2024-53100, CVE-2024-53101, CVE-2024-53102, CVE-2024-53106, CVE-2024-53108, CVE-2024-53109, CVE-2024-53110, CVE-2024-53112, CVE-2024-53113, CVE-2024-53119, CVE-2024-53120, CVE-2024-53121, CVE-2024-53122, CVE-2024-53123, CVE-2024-53126, CVE-2024-53127, CVE-2024-53129, CVE-2024-53130, CVE-2024-53131, CVE-2024-53134, CVE-2024-53135, CVE-2024-53136, CVE-2024-53138, CVE-2024-53139, CVE-2024-53140

Related News