Mageia alert MGASA-2025-0142 (kernel)
From: | Mageia Updates <updates-announce@ml.mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2025-0142: Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities | |
Date: | Thu, 01 May 2025 18:42:56 +0200 | |
Message-ID: | <20250501164256.A04EAA0065@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2025-0142 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities Publication date: 01 May 2025 URL: https://advisories.mageia.org/MGASA-2025-0142.html Type: security Affected Mageia releases: 9 CVE: CVE-2023-53034, CVE-2025-21955, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21966, CVE-2025-21967, CVE-2025-21968, CVE-2025-21969, CVE-2025-21970, CVE-2025-21971, CVE-2025-21975, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980, CVE-2025-21981, CVE-2025-21986, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993, CVE-2025-21994, CVE-2025-21995, CVE-2025-21996, CVE-2025-21997, CVE-2025-21999, CVE-2025-22001, CVE-2025-22003, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22009, CVE-2025-22010, CVE-2025-22013, CVE-2025-22014, CVE-2025-22015, CVE-2025-22018, CVE-2025-22020, CVE-2025-22021, CVE-2025-22025, CVE-2025-22027, CVE-2025-22029, CVE-2025-22033, CVE-2025-22035, CVE-2025-22038, CVE-2025-22040, CVE-2025-22041, CVE-2025-22042, CVE-2025-22043, CVE-2025-22044, CVE-2025-22045, CVE-2025-22047, CVE-2025-22048, CVE-2025-22049, CVE-2025-22050, CVE-2025-22053, CVE-2025-22054, CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058, CVE-2025-22060, CVE-2025-22063, CVE-2025-22064, CVE-2025-22066, CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22074, CVE-2025-22075, CVE-2025-22077, CVE-2025-22079, CVE-2025-22080, CVE-2025-22081, CVE-2025-22083, CVE-2025-22086, CVE-2025-22088, CVE-2025-22089, CVE-2025-22090, CVE-2025-22093, CVE-2025-22095, CVE-2025-22097, CVE-2025-22119, CVE-2025-23136, CVE-2025-23138, CVE-2025-37785, CVE-2025-37893, CVE-2025-38152, CVE-2025-38240, CVE-2025-38575, CVE-2025-38637, CVE-2025-39728, CVE-2025-39735 Description: Upstream kernel version 6.6.87 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References: - https://bugs.mageia.org/show_bug.cgi?id=34189 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... SRPMS: - 9/core/kernel-6.6.88-3.mga9 - 9/core/kmod-virtualbox-7.0.24-70.mga9 - 9/core/kmod-xtables-addons-3.24-78.mga9