{"id":"MGASA-2024-0369","summary":"Updated kernel, kmod-xtables-addons, kmod-virtualbox & bluez packages fix security vulnerabilities","details":"Upstream kernel version 6.6.61 fixes bugs and vulnerabilities.\nThe bluez, kmod-virtualbox and kmod-xtables-addons packages have been\nupdated to work with this new kernel.\nFor information about the vulnerabilities see the links.\n","modified":"2026-02-02T10:12:40.886548Z","published":"2024-11-22T07:25:09Z","related":["CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50111","CVE-2024-50112","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50120","CVE-2024-50121","CVE-2024-50124","CVE-2024-50125","CVE-2024-50126","CVE-2024-50127","CVE-2024-50128","CVE-2024-50130","CVE-2024-50131","CVE-2024-50133","CVE-2024-50134","CVE-2024-50135","CVE-2024-50136","CVE-2024-50139","CVE-2024-50140","CVE-2024-50141","CVE-2024-50142","CVE-2024-50143","CVE-2024-50145","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50151","CVE-2024-50152","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50158","CVE-2024-50159","CVE-2024-50160","CVE-2024-50162","CVE-2024-50163","CVE-2024-50164","CVE-2024-50166","CVE-2024-50167","CVE-2024-50168","CVE-2024-50169","CVE-2024-50170","CVE-2024-50171","CVE-2024-50172","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50210","CVE-2024-50211","CVE-2024-50215","CVE-2024-50216","CVE-2024-50218","CVE-2024-50219","CVE-2024-50222","CVE-2024-50223","CVE-2024-50224","CVE-2024-50226","CVE-2024-50228","CVE-2024-50229","CVE-2024-50230","CVE-2024-50231","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50235","CVE-2024-50236","CVE-2024-50237","CVE-2024-50239","CVE-2024-50240","CVE-2024-50242","CVE-2024-50243","CVE-2024-50244","CVE-2024-50245","CVE-2024-50246","CVE-2024-50247","CVE-2024-50248","CVE-2024-50249","CVE-2024-50250","CVE-2024-50251","CVE-2024-50252","CVE-2024-50255","CVE-2024-50256","CVE-2024-50257","CVE-2024-50258","CVE-2024-50259","CVE-2024-50261","CVE-2024-50262"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0369.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=33775"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.59"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.60"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.61"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.61-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0369.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.20-58.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0369.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.24-66.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0369.json"}},{"package":{"name":"bluez","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/bluez?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.79-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0369.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}