Updated kernel-linus packages fix security vulnerabilities
Publication date: 18 Dec 2024Modification date: 18 Dec 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-53079 , CVE-2024-53091 , CVE-2024-53093 , CVE-2024-53094 , CVE-2024-53095 , CVE-2024-53097 , CVE-2024-53099 , CVE-2024-53100 , CVE-2024-53101 , CVE-2024-53102 , CVE-2024-53106 , CVE-2024-53108 , CVE-2024-53109 , CVE-2024-53110 , CVE-2024-53112 , CVE-2024-53113 , CVE-2024-53119 , CVE-2024-53120 , CVE-2024-53121 , CVE-2024-53122 , CVE-2024-53123 , CVE-2024-53126 , CVE-2024-53127 , CVE-2024-53129 , CVE-2024-53130 , CVE-2024-53131 , CVE-2024-53134 , CVE-2024-53135 , CVE-2024-53136 , CVE-2024-53138 , CVE-2024-53139 , CVE-2024-53140
Description
Vanilla upstream kernel version 6.6.65 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links.
References
- https://bugs.mageia.org/show_bug.cgi?id=33846
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.62
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.63
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.64
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.65
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53134
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53139
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53140
SRPMS
9/core
- kernel-linus-6.6.65-1.mga9