Mageia Security
MGASA-2024-0278 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 07 Aug 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Vanilla upstream kernel version 6.6.43 fix bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Vanilla upstream kernel version 6.6.43 fix bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33447
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
- kernel-linus-6.6.43-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0277 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
Publication date: 07 Aug 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Upstream kernel version 6.6.43 fix bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Upstream kernel version 6.6.43 fix bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33446
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
- kernel-6.6.43-1.mga9
- kmod-xtables-addons-3.24-60.mga9
- kmod-virtualbox-7.0.20-52.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0178 - Updated sddm package provides bugfixes and improvements
Publication date: 07 Aug 2024
Type: bugfix
Affected Mageia releases : 9
Description This update provides several bugfixes and improved Qt6/Wayland support. References
Type: bugfix
Affected Mageia releases : 9
Description This update provides several bugfixes and improved Qt6/Wayland support. References
- https://bugs.mageia.org/show_bug.cgi?id=33453
- https://github.com/sddm/sddm/blob/v0.21.0/ChangeLog
- https://github.com/sddm/sddm/releases/tag/v0.20.0
- https://github.com/sddm/sddm/releases/tag/v0.21.0
- sddm-0.21.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0177 - Updated x11-driver-video-amdgpu packages improve stability and performance with latest kernels
Publication date: 07 Aug 2024
Type: bugfix
Affected Mageia releases : 9
Description This is an update for x11-driver-video-amdgpu that improves stability and performance of the 'amdgpu' x11 driver with the latest kernels. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description This is an update for x11-driver-video-amdgpu that improves stability and performance of the 'amdgpu' x11 driver with the latest kernels. References SRPMS 9/core
- x11-driver-video-amdgpu-23.0.0-2.mga9
Categorías: Actualizaciones de Seguridad