{"id":"MGASA-2026-0097","summary":"Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities","details":"Upstream kernel version 6.6.130 fixes bugs and vulnerabilities.\nThe kmod-virtualbox & kmod-xtables-addons packages have been updated to\nwork with this new kernel.\n","modified":"2026-04-15T17:01:55.103232Z","published":"2026-04-15T16:42:07Z","upstream":["CVE-2025-71160","CVE-2025-71180","CVE-2025-71182","CVE-2025-71183","CVE-2025-71185","CVE-2025-71186","CVE-2025-71188","CVE-2025-71189","CVE-2025-71190","CVE-2025-71191","CVE-2025-71192","CVE-2025-71193","CVE-2025-71194","CVE-2025-71195","CVE-2025-71196","CVE-2025-71197","CVE-2025-71198","CVE-2025-71199","CVE-2025-71200","CVE-2025-71204","CVE-2025-71220","CVE-2025-71222","CVE-2025-71223","CVE-2025-71224","CVE-2025-71228","CVE-2025-71229","CVE-2025-71232","CVE-2025-71235","CVE-2025-71236","CVE-2025-71237","CVE-2025-71238","CVE-2025-71239","CVE-2025-71265","CVE-2025-71266","CVE-2025-71267","CVE-2025-71268","CVE-2025-71270","CVE-2026-22976","CVE-2026-22977","CVE-2026-22978","CVE-2026-22979","CVE-2026-22980","CVE-2026-22982","CVE-2026-22984","CVE-2026-22988","CVE-2026-22990","CVE-2026-22991","CVE-2026-22992","CVE-2026-22994","CVE-2026-23019","CVE-2026-23020","CVE-2026-23021","CVE-2026-23025","CVE-2026-23026","CVE-2026-23030","CVE-2026-23031","CVE-2026-23032","CVE-2026-23033","CVE-2026-23037","CVE-2026-23038","CVE-2026-23047","CVE-2026-23049","CVE-2026-23054","CVE-2026-23056","CVE-2026-23058","CVE-2026-23059","CVE-2026-23060","CVE-2026-23061","CVE-2026-23062","CVE-2026-23063","CVE-2026-23064","CVE-2026-23068","CVE-2026-23069","CVE-2026-23071","CVE-2026-23073","CVE-2026-23074","CVE-2026-23075","CVE-2026-23076","CVE-2026-23078","CVE-2026-23080","CVE-2026-23083","CVE-2026-23084","CVE-2026-23085","CVE-2026-23086","CVE-2026-23087","CVE-2026-23088","CVE-2026-23089","CVE-2026-23090","CVE-2026-23091","CVE-2026-23094","CVE-2026-23095","CVE-2026-23096","CVE-2026-23097","CVE-2026-23098","CVE-2026-23099","CVE-2026-23101","CVE-2026-23103","CVE-2026-23105","CVE-2026-23107","CVE-2026-23108","CVE-2026-23110","CVE-2026-23111","CVE-2026-23112","CVE-2026-23113","CVE-2026-23116","CVE-2026-23119","CVE-2026-23120","CVE-2026-23121","CVE-2026-23123","CVE-2026-23124","CVE-2026-23125","CVE-2026-23126","CVE-2026-23128","CVE-2026-23131","CVE-2026-23133","CVE-2026-23135","CVE-2026-23136","CVE-2026-23139","CVE-2026-23140","CVE-2026-23141","CVE-2026-23142","CVE-2026-23144","CVE-2026-23145","CVE-2026-23146","CVE-2026-23150","CVE-2026-23155","CVE-2026-23156","CVE-2026-23159","CVE-2026-23160","CVE-2026-23163","CVE-2026-23164","CVE-2026-23167","CVE-2026-23168","CVE-2026-23170","CVE-2026-23172","CVE-2026-23173","CVE-2026-23176","CVE-2026-23178","CVE-2026-23179","CVE-2026-23180","CVE-2026-23182","CVE-2026-23187","CVE-2026-23190","CVE-2026-23193","CVE-2026-23198","CVE-2026-23200","CVE-2026-23202","CVE-2026-23204","CVE-2026-23205","CVE-2026-23206","CVE-2026-23209","CVE-2026-23212","CVE-2026-23216","CVE-2026-23220","CVE-2026-23222","CVE-2026-23228","CVE-2026-23229","CVE-2026-23230","CVE-2026-23233","CVE-2026-23234","CVE-2026-23235","CVE-2026-23236","CVE-2026-23237","CVE-2026-23238","CVE-2026-23241","CVE-2026-23242","CVE-2026-23243","CVE-2026-23254","CVE-2026-23256","CVE-2026-23257","CVE-2026-23258","CVE-2026-23260","CVE-2026-23261","CVE-2026-23262","CVE-2026-23264","CVE-2026-23266","CVE-2026-23267","CVE-2026-23273","CVE-2026-23279","CVE-2026-23281","CVE-2026-23284","CVE-2026-23285","CVE-2026-23286","CVE-2026-23287","CVE-2026-23289","CVE-2026-23290","CVE-2026-23291","CVE-2026-23292","CVE-2026-23293","CVE-2026-23296","CVE-2026-23298","CVE-2026-23300","CVE-2026-23303","CVE-2026-23304","CVE-2026-23306","CVE-2026-23307","CVE-2026-23308","CVE-2026-23309","CVE-2026-23310","CVE-2026-23312","CVE-2026-23315","CVE-2026-23317","CVE-2026-23318","CVE-2026-23319","CVE-2026-23321","CVE-2026-23324","CVE-2026-23325","CVE-2026-23334","CVE-2026-23335","CVE-2026-23336","CVE-2026-23339","CVE-2026-23340","CVE-2026-23343","CVE-2026-23347","CVE-2026-23351","CVE-2026-23352","CVE-2026-23356","CVE-2026-23357","CVE-2026-23359","CVE-2026-23362","CVE-2026-23364","CVE-2026-23365","CVE-2026-23367","CVE-2026-23368","CVE-2026-23370","CVE-2026-23372","CVE-2026-23378","CVE-2026-23379","CVE-2026-23381","CVE-2026-23382","CVE-2026-23386","CVE-2026-23387","CVE-2026-23388","CVE-2026-23391","CVE-2026-23392","CVE-2026-23395","CVE-2026-23396","CVE-2026-23397","CVE-2026-23398","CVE-2026-31788"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2026-0097.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=35281"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.121"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.122"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.123"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.124"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.125"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.126"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.127"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.128"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.129"},{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.130"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.6.130-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0097.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.1.14-15.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0097.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.24-89.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0097.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}