{
  "schema_version": "1.6.2",
  "id": "MGASA-2024-0263",
  "published": "2024-07-13T07:54:44Z",
  "modified": "2024-07-13T07:32:59Z",
  "summary": "Updated kernel kmod-xtables-addons kmod-virtualbox dwarves packages fix security vulnerabilities",
  "details": "Upstream kernel version 6.6.37 fix bugs and vulnerabilities.\nThe dwarves, kmod-virtualbox and kmod-xtables-addons packages have been\nupdated to work with this new kernel.\nFor information about the vulnerabilities see the links.\n",
  "related": [
    "CVE-2024-38587",
    "CVE-2024-35981",
    "CVE-2024-35980",
    "CVE-2024-35869",
    "CVE-2024-35870",
    "CVE-2024-35812",
    "CVE-2024-27013",
    "CVE-2024-27020",
    "CVE-2024-27019",
    "CVE-2024-27018",
    "CVE-2024-27016",
    "CVE-2024-27015",
    "CVE-2024-27014",
    "CVE-2024-26988",
    "CVE-2024-26987",
    "CVE-2024-26986",
    "CVE-2024-26984",
    "CVE-2024-26983",
    "CVE-2024-27009",
    "CVE-2024-27008",
    "CVE-2024-27005",
    "CVE-2024-27004",
    "CVE-2024-27003",
    "CVE-2024-27002",
    "CVE-2024-27001",
    "CVE-2024-27000",
    "CVE-2024-26999",
    "CVE-2024-26981",
    "CVE-2024-26998",
    "CVE-2024-26997",
    "CVE-2024-26996",
    "CVE-2024-26994",
    "CVE-2024-26993",
    "CVE-2024-26992",
    "CVE-2024-26990",
    "CVE-2024-26989",
    "CVE-2024-26936",
    "CVE-2024-26980",
    "CVE-2024-26939",
    "CVE-2024-36029",
    "CVE-2024-35990",
    "CVE-2024-35999",
    "CVE-2024-35998",
    "CVE-2024-35997",
    "CVE-2024-35996",
    "CVE-2024-35995",
    "CVE-2024-35992",
    "CVE-2024-36009",
    "CVE-2024-36008",
    "CVE-2024-36007",
    "CVE-2024-36006",
    "CVE-2024-36005",
    "CVE-2024-36004",
    "CVE-2024-36003",
    "CVE-2024-36000",
    "CVE-2024-35991",
    "CVE-2024-35989",
    "CVE-2024-35988",
    "CVE-2024-35987",
    "CVE-2024-35986",
    "CVE-2024-35985",
    "CVE-2024-35983",
    "CVE-2024-35984",
    "CVE-2024-35855",
    "CVE-2024-35854",
    "CVE-2024-35853",
    "CVE-2024-35852",
    "CVE-2024-35851",
    "CVE-2024-35850",
    "CVE-2024-35849",
    "CVE-2024-35858",
    "CVE-2024-35857",
    "CVE-2024-35856",
    "CVE-2024-35847",
    "CVE-2024-27396",
    "CVE-2024-27395",
    "CVE-2024-36484",
    "CVE-2024-36964",
    "CVE-2024-36963",
    "CVE-2024-36962",
    "CVE-2024-36960",
    "CVE-2024-36942",
    "CVE-2024-36951",
    "CVE-2024-36950",
    "CVE-2024-36949",
    "CVE-2024-36947",
    "CVE-2024-36946",
    "CVE-2024-36945",
    "CVE-2024-36944",
    "CVE-2024-36959",
    "CVE-2024-36957",
    "CVE-2024-36955",
    "CVE-2024-36954",
    "CVE-2024-36953",
    "CVE-2024-36952",
    "CVE-2024-36916",
    "CVE-2024-36914",
    "CVE-2024-36913",
    "CVE-2024-36912",
    "CVE-2024-36911",
    "CVE-2024-36941",
    "CVE-2024-36940",
    "CVE-2024-36939",
    "CVE-2024-36938",
    "CVE-2024-36937",
    "CVE-2024-36910",
    "CVE-2024-36934",
    "CVE-2024-36933",
    "CVE-2024-36931",
    "CVE-2024-36930",
    "CVE-2024-36929",
    "CVE-2024-36928",
    "CVE-2024-36927",
    "CVE-2024-36909",
    "CVE-2024-36926",
    "CVE-2024-36925",
    "CVE-2024-36924",
    "CVE-2024-36922",
    "CVE-2024-36921",
    "CVE-2024-36920",
    "CVE-2024-36919",
    "CVE-2024-36918",
    "CVE-2024-36917",
    "CVE-2024-36908",
    "CVE-2024-36880",
    "CVE-2024-36889",
    "CVE-2024-36888",
    "CVE-2024-36887",
    "CVE-2024-36886",
    "CVE-2024-36885",
    "CVE-2024-36883",
    "CVE-2024-36906",
    "CVE-2024-36905",
    "CVE-2024-36904",
    "CVE-2024-36903",
    "CVE-2024-36902",
    "CVE-2024-36901",
    "CVE-2024-36900",
    "CVE-2024-36882",
    "CVE-2024-36899",
    "CVE-2024-36898",
    "CVE-2024-36897",
    "CVE-2024-36896",
    "CVE-2024-36895",
    "CVE-2024-36894",
    "CVE-2024-36893",
    "CVE-2024-36891",
    "CVE-2024-36890",
    "CVE-2024-36881",
    "CVE-2024-36032",
    "CVE-2023-52882",
    "CVE-2024-36031",
    "CVE-2024-36028",
    "CVE-2024-36017",
    "CVE-2024-36011",
    "CVE-2024-36012",
    "CVE-2024-35947",
    "CVE-2024-35848",
    "CVE-2024-36977",
    "CVE-2024-36975",
    "CVE-2024-36966",
    "CVE-2024-36969",
    "CVE-2024-36968",
    "CVE-2024-36967",
    "CVE-2024-36965",
    "CVE-2024-36966",
    "CVE-2024-37021",
    "CVE-2024-36479",
    "CVE-2024-35247",
    "CVE-2024-34030",
    "CVE-2024-34027",
    "CVE-2024-33847",
    "CVE-2024-39292",
    "CVE-2024-38667",
    "CVE-2024-39291",
    "CVE-2024-38384",
    "CVE-2024-38664",
    "CVE-2024-38663",
    "CVE-2024-36481",
    "CVE-2024-36477",
    "CVE-2024-34777",
    "CVE-2024-39277",
    "CVE-2024-38662",
    "CVE-2024-38780",
    "CVE-2024-38659",
    "CVE-2024-38634",
    "CVE-2024-38637",
    "CVE-2024-38636",
    "CVE-2024-38635",
    "CVE-2024-36484",
    "CVE-2024-36286",
    "CVE-2024-36281",
    "CVE-2024-36270",
    "CVE-2024-36244",
    "CVE-2024-33621",
    "CVE-2024-38633",
    "CVE-2024-38632",
    "CVE-2024-38630",
    "CVE-2024-38629",
    "CVE-2024-38628",
    "CVE-2024-38627",
    "CVE-2024-38625",
    "CVE-2024-38624",
    "CVE-2024-33619",
    "CVE-2024-38623",
    "CVE-2024-38622",
    "CVE-2024-38621",
    "CVE-2024-38391",
    "CVE-2024-38390",
    "CVE-2024-38388",
    "CVE-2024-38381",
    "CVE-2024-37356",
    "CVE-2024-37353",
    "CVE-2024-36489",
    "CVE-2023-52884",
    "CVE-2024-31076",
    "CVE-2024-38620",
    "CVE-2024-38617",
    "CVE-2024-38616",
    "CVE-2024-38615",
    "CVE-2024-38614",
    "CVE-2024-38613",
    "CVE-2024-38612",
    "CVE-2024-38611",
    "CVE-2024-38610",
    "CVE-2024-38618",
    "CVE-2024-38607",
    "CVE-2024-38605",
    "CVE-2024-38604",
    "CVE-2024-38603",
    "CVE-2024-38601",
    "CVE-2024-38602",
    "CVE-2024-38598",
    "CVE-2024-38597",
    "CVE-2024-38596",
    "CVE-2024-38593",
    "CVE-2024-38591",
    "CVE-2024-38600",
    "CVE-2024-38599",
    "CVE-2024-38589",
    "CVE-2024-38590",
    "CVE-2024-38575",
    "CVE-2024-38584",
    "CVE-2024-38583",
    "CVE-2024-38582",
    "CVE-2024-38581",
    "CVE-2024-38580",
    "CVE-2024-38579",
    "CVE-2024-38578",
    "CVE-2024-38577",
    "CVE-2024-38588",
    "CVE-2024-38587",
    "CVE-2024-38586",
    "CVE-2024-38585",
    "CVE-2024-38576",
    "CVE-2024-38568",
    "CVE-2024-38573",
    "CVE-2024-38572",
    "CVE-2024-38571",
    "CVE-2024-38570",
    "CVE-2024-38569",
    "CVE-2024-36979",
    "CVE-2024-38546",
    "CVE-2024-38545",
    "CVE-2024-38544",
    "CVE-2024-38543",
    "CVE-2024-38541",
    "CVE-2024-38567",
    "CVE-2024-38540",
    "CVE-2024-38566",
    "CVE-2024-38565",
    "CVE-2024-38564",
    "CVE-2024-38562",
    "CVE-2024-38561",
    "CVE-2024-38560",
    "CVE-2024-38559",
    "CVE-2024-38558",
    "CVE-2024-38557",
    "CVE-2024-38539",
    "CVE-2024-38556",
    "CVE-2024-38555",
    "CVE-2024-38554",
    "CVE-2024-38553",
    "CVE-2024-38552",
    "CVE-2024-38551",
    "CVE-2024-38550",
    "CVE-2024-38549",
    "CVE-2024-38548",
    "CVE-2024-38547",
    "CVE-2024-38538",
    "CVE-2024-39476",
    "CVE-2024-39485",
    "CVE-2024-39484",
    "CVE-2024-39483",
    "CVE-2024-39482",
    "CVE-2024-39481",
    "CVE-2024-39480",
    "CVE-2024-39479",
    "CVE-2024-39475",
    "CVE-2024-39473",
    "CVE-2024-39474",
    "CVE-2024-39471",
    "CVE-2024-39470",
    "CVE-2024-39468",
    "CVE-2024-39467",
    "CVE-2024-39466",
    "CVE-2024-39464",
    "CVE-2024-39461",
    "CVE-2024-39463",
    "CVE-2024-39462",
    "CVE-2024-39296",
    "CVE-2024-39276",
    "CVE-2024-38661",
    "CVE-2024-38385",
    "CVE-2024-37354",
    "CVE-2024-39362",
    "CVE-2024-39301",
    "CVE-2022-48772",
    "CVE-2024-39469",
    "CVE-2024-39298",
    "CVE-2024-39371",
    "CVE-2024-37078",
    "CVE-2024-39486"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2024-0263.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=33373"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.37"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.36"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.35"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.34"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.33"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.32"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.31"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.30"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.29"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kernel",
        "purl": "pkg:rpm/mageia/kernel?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "6.6.37-1.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kmod-xtables-addons",
        "purl": "pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.24-59.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kmod-virtualbox",
        "purl": "pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7.0.18-50.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "dwarves",
        "purl": "pkg:rpm/mageia/dwarves?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.27-1.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
