{"id":"MGASA-2024-0277","summary":"Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities","details":"Upstream kernel version 6.6.43 fix bugs and vulnerabilities.\nThe kmod-virtualbox and kmod-xtables-addons packages have been\nupdated to work with this new kernel.\nFor information about the vulnerabilities see the links.\n","modified":"2026-01-31T15:34:48.820252Z","published":"2024-08-07T05:49:38Z","related":["CVE-2023-52888","CVE-2024-40947","CVE-2024-41015","CVE-2024-41017","CVE-2024-41018","CVE-2024-41019","CVE-2024-41020","CVE-2024-41022","CVE-2024-41024","CVE-2024-41025","CVE-2024-41027","CVE-2024-41028","CVE-2024-41030","CVE-2024-41031","CVE-2024-41032","CVE-2024-41034","CVE-2024-41035","CVE-2024-41036","CVE-2024-41037","CVE-2024-41038","CVE-2024-41039","CVE-2024-41040","CVE-2024-41041","CVE-2024-41044","CVE-2024-41046","CVE-2024-41047","CVE-2024-41048","CVE-2024-41049","CVE-2024-41050","CVE-2024-41051","CVE-2024-41052","CVE-2024-41053","CVE-2024-41054","CVE-2024-41055","CVE-2024-41056","CVE-2024-41057","CVE-2024-41058","CVE-2024-41059","CVE-2024-41060","CVE-2024-41062","CVE-2024-41063","CVE-2024-41064","CVE-2024-41065","CVE-2024-41066","CVE-2024-41068","CVE-2024-41069","CVE-2024-41070","CVE-2024-41072","CVE-2024-41073","CVE-2024-41074","CVE-2024-41075","CVE-2024-41076","CVE-2024-41077","CVE-2024-41078","CVE-2024-41079","CVE-2024-41081","CVE-2024-41090","CVE-2024-41091","CVE-2024-42067","CVE-2024-42068","CVE-2024-42100","CVE-2024-42101","CVE-2024-42102","CVE-2024-42103","CVE-2024-42104","CVE-2024-42105","CVE-2024-42106","CVE-2024-42109","CVE-2024-42110","CVE-2024-42113","CVE-2024-42115","CVE-2024-42116","CVE-2024-42119","CVE-2024-42120","CVE-2024-42121","CVE-2024-42124","CVE-2024-42126","CVE-2024-42127","CVE-2024-42128","CVE-2024-42130","CVE-2024-42131","CVE-2024-42132","CVE-2024-42133","CVE-2024-42135","CVE-2024-42136","CVE-2024-42137","CVE-2024-42138","CVE-2024-42140","CVE-2024-42141","CVE-2024-42142","CVE-2024-42143","CVE-2024-42144","CVE-2024-42145","CVE-2024-42147","CVE-2024-42148","CVE-2024-42152","CVE-2024-42153","CVE-2024-42154","CVE-2024-42157","CVE-2024-42159","CVE-2024-42160","CVE-2024-42161","CVE-2024-42223","CVE-2024-42224","CVE-2024-42225","CVE-2024-42226","CVE-2024-42228","CVE-2024-42229","CVE-2024-42230"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0277.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=33446"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.43-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0277.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.24-60.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0277.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.20-52.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0277.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}