{
  "schema_version": "1.6.2",
  "id": "MGASA-2024-0277",
  "published": "2024-08-07T05:49:38Z",
  "modified": "2024-08-07T05:25:30Z",
  "summary": "Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities",
  "details": "Upstream kernel version 6.6.43 fix bugs and vulnerabilities.\nThe kmod-virtualbox and kmod-xtables-addons packages have been\nupdated to work with this new kernel.\nFor information about the vulnerabilities see the links.\n",
  "related": [
    "CVE-2024-42068",
    "CVE-2024-42067",
    "CVE-2024-42145",
    "CVE-2024-42154",
    "CVE-2024-42153",
    "CVE-2024-42152",
    "CVE-2024-42148",
    "CVE-2024-42230",
    "CVE-2024-42229",
    "CVE-2024-42228",
    "CVE-2024-42226",
    "CVE-2024-42225",
    "CVE-2024-42147",
    "CVE-2024-42224",
    "CVE-2024-42223",
    "CVE-2024-42161",
    "CVE-2024-42160",
    "CVE-2024-42159",
    "CVE-2024-42157",
    "CVE-2024-42110",
    "CVE-2024-42119",
    "CVE-2024-42116",
    "CVE-2024-42115",
    "CVE-2024-42144",
    "CVE-2024-42143",
    "CVE-2024-42142",
    "CVE-2024-42141",
    "CVE-2024-42140",
    "CVE-2024-42113",
    "CVE-2024-42138",
    "CVE-2024-42137",
    "CVE-2024-42136",
    "CVE-2024-42135",
    "CVE-2024-42133",
    "CVE-2024-42132",
    "CVE-2024-42131",
    "CVE-2024-42130",
    "CVE-2024-42128",
    "CVE-2024-42127",
    "CVE-2024-42126",
    "CVE-2024-42124",
    "CVE-2024-42121",
    "CVE-2024-42120",
    "CVE-2023-52888",
    "CVE-2024-42106",
    "CVE-2024-42105",
    "CVE-2024-42104",
    "CVE-2024-42103",
    "CVE-2024-42102",
    "CVE-2024-42101",
    "CVE-2024-42100",
    "CVE-2024-42109",
    "CVE-2024-40947",
    "CVE-2024-42226",
    "CVE-2024-41056",
    "CVE-2024-41053",
    "CVE-2024-41055",
    "CVE-2024-41054",
    "CVE-2024-41032",
    "CVE-2024-41031",
    "CVE-2024-41030",
    "CVE-2024-41028",
    "CVE-2024-41027",
    "CVE-2024-41052",
    "CVE-2024-41051",
    "CVE-2024-41050",
    "CVE-2024-41049",
    "CVE-2024-41048",
    "CVE-2024-41047",
    "CVE-2024-41046",
    "CVE-2024-41044",
    "CVE-2024-41025",
    "CVE-2024-41041",
    "CVE-2024-41040",
    "CVE-2024-41039",
    "CVE-2024-41038",
    "CVE-2024-41037",
    "CVE-2024-41036",
    "CVE-2024-41035",
    "CVE-2024-41034",
    "CVE-2024-41024",
    "CVE-2024-41081",
    "CVE-2024-41078",
    "CVE-2024-41079",
    "CVE-2024-41076",
    "CVE-2024-41075",
    "CVE-2024-41074",
    "CVE-2024-41073",
    "CVE-2024-41072",
    "CVE-2024-41070",
    "CVE-2024-41069",
    "CVE-2024-41077",
    "CVE-2024-41068",
    "CVE-2024-41066",
    "CVE-2024-41065",
    "CVE-2024-41064",
    "CVE-2024-41063",
    "CVE-2024-41062",
    "CVE-2024-41060",
    "CVE-2024-41059",
    "CVE-2024-41057",
    "CVE-2024-41058",
    "CVE-2024-41022",
    "CVE-2024-41020",
    "CVE-2024-41019",
    "CVE-2024-41018",
    "CVE-2024-41017",
    "CVE-2024-41015",
    "CVE-2024-41090",
    "CVE-2024-41091"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2024-0277.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=33446"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42"
    },
    {
      "type": "REPORT",
      "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kernel",
        "purl": "pkg:rpm/mageia/kernel?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "6.6.43-1.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kmod-xtables-addons",
        "purl": "pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.24-60.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    },
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "kmod-virtualbox",
        "purl": "pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "7.0.20-52.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
