Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2026-118
Advisory Released Date: 2026-05-09
Advisory Updated Date: 2026-05-13
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: add seqadj extension for natted connections (CVE-2025-68206)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (CVE-2026-23274)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (CVE-2026-23277)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: pegasus: validate USB endpoints (CVE-2026-23290)
In the Linux kernel, the following vulnerability has been resolved:
net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (CVE-2026-23293)
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop (CVE-2026-23300)
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Don't log plaintext credentials in cifs_set_cifscreds (CVE-2026-23303)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (CVE-2026-23304)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: kaweth: validate USB endpoints (CVE-2026-23312)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: split gc into unlink and reclaim phase (CVE-2026-23351)
In the Linux kernel, the following vulnerability has been resolved:
x86/efi: defer freeing of boot services memory (CVE-2026-23352)
In the Linux kernel, the following vulnerability has been resolved:
drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() (CVE-2026-23356)
In the Linux kernel, the following vulnerability has been resolved:
can: bcm: fix locking for bcm_op runtime updates (CVE-2026-23362)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: kalmia: validate USB endpoints (CVE-2026-23365)
In the Linux kernel, the following vulnerability has been resolved:
net: phy: register phy led_triggers during probe to avoid AB-BA deadlock (CVE-2026-23368)
In the Linux kernel, the following vulnerability has been resolved:
net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (CVE-2026-23381)
In the Linux kernel, the following vulnerability has been resolved:
HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (CVE-2026-23382)
In the Linux kernel, the following vulnerability has been resolved:
Squashfs: check metadata block offset is within range (CVE-2026-23388)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: xt_CT: drop pending enqueued packets on template removal (CVE-2026-23391)
In the Linux kernel, the following vulnerability has been resolved:
nfnetlink_osf: validate individual option lengths in fingerprints (CVE-2026-23397)
In the Linux kernel, the following vulnerability has been resolved:
icmp: fix NULL pointer dereference in icmp_tag_validation() (CVE-2026-23398)
In the Linux kernel, the following vulnerability has been resolved:
udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n (CVE-2026-23439)
In the Linux kernel, the following vulnerability has been resolved:
PM: runtime: Fix a race condition related to device removal (CVE-2026-23452)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() (CVE-2026-23455)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case (CVE-2026-23456)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() (CVE-2026-23457)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() (CVE-2026-23458)
In the Linux kernel, the following vulnerability has been resolved:
nvdimm/bus: Fix potential use after free in asynchronous initialization (CVE-2026-31399)
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: fix cache_request leak in cache_release (CVE-2026-31400)
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (CVE-2026-31402)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd (CVE-2026-31403)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: avoid overflows in ip6_datagram_send_ctl() (CVE-2026-31415)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_log: account for netlink header size (CVE-2026-31416)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: drop logically empty buckets in mtype_del (CVE-2026-31418)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_fw: fix NULL pointer dereference on shared blocks (CVE-2026-31421)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_flow: fix NULL pointer dereference on shared blocks (CVE-2026-31422)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() (CVE-2026-31423)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP (CVE-2026-31424)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp (CVE-2026-31427)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD (CVE-2026-31428)
In the Linux kernel, the following vulnerability has been resolved:
ext4: reject mount if bigalloc with s_first_data_block != 0 (CVE-2026-31447)
In the Linux kernel, the following vulnerability has been resolved:
ext4: publish jinode after initialization (CVE-2026-31450)
In the Linux kernel, the following vulnerability has been resolved:
ext4: convert inline data to extents when truncate exceeds inline size (CVE-2026-31452)
In the Linux kernel, the following vulnerability has been resolved:
xfs: save ailp before dropping the AIL lock in push callbacks (CVE-2026-31454)
In the Linux kernel, the following vulnerability has been resolved:
xfs: stop reclaim before pushing AIL during unmount (CVE-2026-31455)
In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: fix folio isn't locked in softleaf_to_folio() (CVE-2026-31466)
In the Linux kernel, the following vulnerability has been resolved:
virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false (CVE-2026-31469)
In the Linux kernel, the following vulnerability has been resolved:
media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex (CVE-2026-31473)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: use netlink policy range checks (CVE-2026-31495)
In the Linux kernel, the following vulnerability has been resolved:
net: fix fanout UAF in packet_release() via NETDEV_UP race (CVE-2026-31504)
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: Avoid releasing netdev before teardown completes (CVE-2026-31508)
In the Linux kernel, the following vulnerability has been resolved:
af_key: validate families in pfkey_send_migrate() (CVE-2026-31515)
In the Linux kernel, the following vulnerability has been resolved:
esp: fix skb leak with espintcp and async crypto (CVE-2026-31518)
In the Linux kernel, the following vulnerability has been resolved:
nvme-pci: ensure we're polling a polled queue (CVE-2026-31523)
In the Linux kernel, the following vulnerability has been resolved:
HID: asus: avoid memory leak in asus_report_fixup() (CVE-2026-31524)
In the Linux kernel, the following vulnerability has been resolved:
net: bonding: fix NULL deref in bond_debug_rlb_hash_show (CVE-2026-31546)
In the Linux kernel, the following vulnerability has been resolved:
futex: Clear stale exiting pointer in futex_lock_pi() retry path (CVE-2026-31555)
In the Linux kernel, the following vulnerability has been resolved:
can: gw: fix OOB heap access in cgw_csum_crc8_rel() (CVE-2026-31570)
In the Linux kernel, the following vulnerability has been resolved:
x86/CPU: Fix FPDSS on Zen1 (CVE-2026-31628)
In the Linux kernel, the following vulnerability has been resolved:
mmc: vub300: fix NULL-deref on disconnect (CVE-2026-31651)
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG (CVE-2026-31662)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: fix use-after-free in timeout object destroy (CVE-2026-31665)
In the Linux kernel, the following vulnerability has been resolved:
Input: uinput - fix circular locking dependency with ff-core (CVE-2026-31667)
In the Linux kernel, the following vulnerability has been resolved:
seg6: separate dst_cache for input and output paths in seg6 lwtunnel (CVE-2026-31668)
In the Linux kernel, the following vulnerability has been resolved:
net: rfkill: prevent unlimited numbers of rfkill events from being created (CVE-2026-31670)
In the Linux kernel, the following vulnerability has been resolved:
xfrm_user: fix info leak in build_report() (CVE-2026-31671)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() (CVE-2026-31674)
In the Linux kernel, the following vulnerability has been resolved:
openvswitch: validate MPLS set/set_masked payload length (CVE-2026-31679)
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: flowlabel: defer exclusive option free until RCU teardown (CVE-2026-31680)
In the Linux kernel, the following vulnerability has been resolved:
bridge: br_nd_send: linearize skb before parsing ND options (CVE-2026-31682)
In the Linux kernel, the following vulnerability has been resolved:
vxlan: validate ND option lengths in vxlan_na_create (CVE-2026-31738)
In the Linux kernel, the following vulnerability has been resolved:
bridge: br_nd_send: validate ND option lengths (CVE-2026-31752)
In the Linux kernel, the following vulnerability has been resolved:
usb: usbtmc: Flush anchored URBs in usbtmc_release (CVE-2026-31758)
In the Linux kernel, the following vulnerability has been resolved:
usb: ulpi: fix double free in ulpi_register_interface() error path (CVE-2026-31759)
In the Linux kernel, the following vulnerability has been resolved:
drm/ioc32: stop speculation on the drm_compat_ioctl path (CVE-2026-31781)
In the Linux kernel, the following vulnerability has been resolved:
xen/privcmd: restrict usage in unprivileged domU (CVE-2026-31788)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: reject immediate NF_QUEUE verdict (CVE-2026-43024)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent (CVE-2026-43026)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_helper: pass helper to expect cleanup (CVE-2026-43027)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: ensure names are nul-terminated (CVE-2026-43028)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix regsafe() for pointers to packet (CVE-2026-43030)
In the Linux kernel, the following vulnerability has been resolved:
net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak (CVE-2026-43035)
In the Linux kernel, the following vulnerability has been resolved:
ip6_tunnel: clear skb2->cb[] in ip4ip6_err() (CVE-2026-43037)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() (CVE-2026-43038)
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak (CVE-2026-43040)
In the Linux kernel, the following vulnerability has been resolved:
crypto: af-alg - fix NULL pointer dereference in scatterwalk (CVE-2026-43043)
In the Linux kernel, the following vulnerability has been resolved:
HID: multitouch: Check to ensure report responses match the request (CVE-2026-43047)
In the Linux kernel, the following vulnerability has been resolved:
HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq (CVE-2026-43051)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: drop pending enqueued packets on removal (CVE-2026-43060)
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: Fix TX deadlock when using DMA (CVE-2026-43061)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths (CVE-2026-43066)
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal() (CVE-2026-43068)
In the Linux kernel, the following vulnerability has been resolved:
xfrm: esp: avoid in-place decrypt on shared skb frags
"Dirty Frag" and other issues in Amazon Linux kernels:
https://aws.amazon.com/security/security-bulletins/2026-027-aws/ (CVE-2026-43284)
In the Linux kernel, the following vulnerability has been resolved:
lib/crypto: chacha: Zeroize permuted_state before it leaves scope (CVE-2026-43336)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: prevent possible UaF in addrconf_permanent_addr() (CVE-2026-43339)
In the Linux kernel, the following vulnerability has been resolved:
x86/apic: Disable x2apic on resume if the kernel expects so (CVE-2026-43363)
In the Linux kernel, the following vulnerability has been resolved:
net/tcp-md5: Fix MAC comparison to be constant-time (CVE-2026-43383)
In the Linux kernel, the following vulnerability has been resolved:
libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() (CVE-2026-43407)
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix divide-by-zero in tipc_sk_filter_connect() (CVE-2026-43411)
In the Linux kernel, the following vulnerability has been resolved:
USB: core: Limit the length of unkillable synchronous timeouts (CVE-2026-43428)
In the Linux kernel, the following vulnerability has been resolved:
USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts (CVE-2026-43429)
In the Linux kernel, the following vulnerability has been resolved:
usb: xhci: Fix memory leak in xhci_disable_slot() (CVE-2026-43432)
In the Linux kernel, the following vulnerability has been resolved:
cgroup: fix race between task migration and iteration (CVE-2026-43439)
In the Linux kernel, the following vulnerability has been resolved:
e1000/e1000e: Fix leak in DMA error cleanup (CVE-2026-43445)
In the Linux kernel, the following vulnerability has been resolved:
nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set (CVE-2026-43449)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_cthelper: fix OOB read in nfnl_cthelper_dump_table() (CVE-2026-43450)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path (CVE-2026-43451)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop() (CVE-2026-43453)
In the Linux kernel, the following vulnerability has been resolved:
scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (CVE-2026-43475)
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (CVE-2026-43500)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2026-118 to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.10.253-252.1015.amzn2.aarch64
kernel-headers-5.10.253-252.1015.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.253-252.1015.amzn2.aarch64
perf-5.10.253-252.1015.amzn2.aarch64
perf-debuginfo-5.10.253-252.1015.amzn2.aarch64
python-perf-5.10.253-252.1015.amzn2.aarch64
python-perf-debuginfo-5.10.253-252.1015.amzn2.aarch64
kernel-tools-5.10.253-252.1015.amzn2.aarch64
kernel-tools-devel-5.10.253-252.1015.amzn2.aarch64
kernel-tools-debuginfo-5.10.253-252.1015.amzn2.aarch64
bpftool-5.10.253-252.1015.amzn2.aarch64
bpftool-debuginfo-5.10.253-252.1015.amzn2.aarch64
kernel-devel-5.10.253-252.1015.amzn2.aarch64
kernel-debuginfo-5.10.253-252.1015.amzn2.aarch64
kernel-livepatch-5.10.253-252.1015-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.253-252.1015.amzn2.i686
src:
kernel-5.10.253-252.1015.amzn2.src
x86_64:
kernel-5.10.253-252.1015.amzn2.x86_64
kernel-headers-5.10.253-252.1015.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.253-252.1015.amzn2.x86_64
perf-5.10.253-252.1015.amzn2.x86_64
perf-debuginfo-5.10.253-252.1015.amzn2.x86_64
python-perf-5.10.253-252.1015.amzn2.x86_64
python-perf-debuginfo-5.10.253-252.1015.amzn2.x86_64
kernel-tools-5.10.253-252.1015.amzn2.x86_64
kernel-tools-devel-5.10.253-252.1015.amzn2.x86_64
kernel-tools-debuginfo-5.10.253-252.1015.amzn2.x86_64
bpftool-5.10.253-252.1015.amzn2.x86_64
bpftool-debuginfo-5.10.253-252.1015.amzn2.x86_64
kernel-devel-5.10.253-252.1015.amzn2.x86_64
kernel-debuginfo-5.10.253-252.1015.amzn2.x86_64
kernel-livepatch-5.10.253-252.1015-1.0-0.amzn2.x86_64
2026-05-13: CVE-2026-43432 was added to this advisory.
2026-05-13: CVE-2026-31415 was added to this advisory.
2026-05-13: CVE-2026-31555 was added to this advisory.
2026-05-13: CVE-2026-31662 was added to this advisory.
2026-05-13: CVE-2026-23274 was added to this advisory.
2026-05-13: CVE-2026-31758 was added to this advisory.
2026-05-13: CVE-2026-43040 was added to this advisory.
2026-05-13: CVE-2026-43068 was added to this advisory.
2026-05-13: CVE-2026-31424 was added to this advisory.
2026-05-13: CVE-2026-23312 was added to this advisory.
2026-05-13: CVE-2026-23439 was added to this advisory.
2026-05-13: CVE-2026-23293 was added to this advisory.
2026-05-13: CVE-2026-23365 was added to this advisory.
2026-05-13: CVE-2026-31416 was added to this advisory.
2026-05-13: CVE-2026-43411 was added to this advisory.
2026-05-13: CVE-2026-31447 was added to this advisory.
2026-05-13: CVE-2026-31400 was added to this advisory.
2026-05-13: CVE-2026-43451 was added to this advisory.
2026-05-13: CVE-2026-31518 was added to this advisory.
2026-05-13: CVE-2026-43030 was added to this advisory.
2026-05-13: CVE-2026-43407 was added to this advisory.
2026-05-13: CVE-2025-68206 was added to this advisory.
2026-05-13: CVE-2026-31679 was added to this advisory.
2026-05-13: CVE-2026-43453 was added to this advisory.
2026-05-13: CVE-2026-31651 was added to this advisory.
2026-05-13: CVE-2026-23457 was added to this advisory.
2026-05-13: CVE-2026-31455 was added to this advisory.
2026-05-13: CVE-2026-23368 was added to this advisory.
2026-05-13: CVE-2026-43445 was added to this advisory.
2026-05-13: CVE-2026-31450 was added to this advisory.
2026-05-13: CVE-2026-31523 was added to this advisory.
2026-05-13: CVE-2026-31452 was added to this advisory.
2026-05-13: CVE-2026-31674 was added to this advisory.
2026-05-13: CVE-2026-31680 was added to this advisory.
2026-05-13: CVE-2026-43439 was added to this advisory.
2026-05-13: CVE-2026-31515 was added to this advisory.
2026-05-13: CVE-2026-43047 was added to this advisory.
2026-05-13: CVE-2026-23304 was added to this advisory.
2026-05-13: CVE-2026-31670 was added to this advisory.
2026-05-13: CVE-2026-31788 was added to this advisory.
2026-05-13: CVE-2026-31668 was added to this advisory.
2026-05-13: CVE-2026-31671 was added to this advisory.
2026-05-13: CVE-2026-31403 was added to this advisory.
2026-05-13: CVE-2026-43024 was added to this advisory.
2026-05-13: CVE-2026-43339 was added to this advisory.
2026-05-13: CVE-2026-31682 was added to this advisory.
2026-05-13: CVE-2026-31427 was added to this advisory.
2026-05-13: CVE-2026-23356 was added to this advisory.
2026-05-13: CVE-2026-31546 was added to this advisory.
2026-05-13: CVE-2026-23398 was added to this advisory.
2026-05-13: CVE-2026-31422 was added to this advisory.
2026-05-13: CVE-2026-43043 was added to this advisory.
2026-05-13: CVE-2026-23456 was added to this advisory.
2026-05-13: CVE-2026-43026 was added to this advisory.
2026-05-13: CVE-2026-43035 was added to this advisory.
2026-05-13: CVE-2026-43500 was added to this advisory.
2026-05-13: CVE-2026-23351 was added to this advisory.
2026-05-13: CVE-2026-31628 was added to this advisory.
2026-05-13: CVE-2026-31399 was added to this advisory.
2026-05-13: CVE-2026-43060 was added to this advisory.
2026-05-13: CVE-2026-43038 was added to this advisory.
2026-05-13: CVE-2026-31473 was added to this advisory.
2026-05-13: CVE-2026-31524 was added to this advisory.
2026-05-13: CVE-2026-31504 was added to this advisory.
2026-05-13: CVE-2026-43429 was added to this advisory.
2026-05-13: CVE-2026-23397 was added to this advisory.
2026-05-13: CVE-2026-43428 was added to this advisory.
2026-05-13: CVE-2026-23382 was added to this advisory.
2026-05-13: CVE-2026-23388 was added to this advisory.
2026-05-13: CVE-2026-23458 was added to this advisory.
2026-05-13: CVE-2026-43475 was added to this advisory.
2026-05-13: CVE-2026-31454 was added to this advisory.
2026-05-13: CVE-2026-43028 was added to this advisory.
2026-05-13: CVE-2026-31495 was added to this advisory.
2026-05-13: CVE-2026-31508 was added to this advisory.
2026-05-13: CVE-2026-43061 was added to this advisory.
2026-05-13: CVE-2026-31781 was added to this advisory.
2026-05-13: CVE-2026-31752 was added to this advisory.
2026-05-13: CVE-2026-23277 was added to this advisory.
2026-05-13: CVE-2026-31759 was added to this advisory.
2026-05-13: CVE-2026-23455 was added to this advisory.
2026-05-13: CVE-2026-43066 was added to this advisory.
2026-05-13: CVE-2026-31428 was added to this advisory.
2026-05-13: CVE-2026-23452 was added to this advisory.
2026-05-13: CVE-2026-31469 was added to this advisory.
2026-05-13: CVE-2026-31738 was added to this advisory.
2026-05-13: CVE-2026-43449 was added to this advisory.
2026-05-13: CVE-2026-23290 was added to this advisory.
2026-05-13: CVE-2026-23300 was added to this advisory.
2026-05-13: CVE-2026-43027 was added to this advisory.
2026-05-13: CVE-2026-23362 was added to this advisory.
2026-05-13: CVE-2026-23381 was added to this advisory.
2026-05-13: CVE-2026-43450 was added to this advisory.
2026-05-13: CVE-2026-43363 was added to this advisory.
2026-05-13: CVE-2026-43051 was added to this advisory.
2026-05-13: CVE-2026-43336 was added to this advisory.
2026-05-13: CVE-2026-23391 was added to this advisory.
2026-05-13: CVE-2026-43383 was added to this advisory.
2026-05-13: CVE-2026-31665 was added to this advisory.
2026-05-13: CVE-2026-31418 was added to this advisory.
2026-05-13: CVE-2026-31423 was added to this advisory.
2026-05-13: CVE-2026-31402 was added to this advisory.
2026-05-13: CVE-2026-43037 was added to this advisory.
2026-05-13: CVE-2026-23303 was added to this advisory.
2026-05-13: CVE-2026-31667 was added to this advisory.
2026-05-13: CVE-2026-23352 was added to this advisory.
2026-05-13: CVE-2026-31466 was added to this advisory.
2026-05-13: CVE-2026-31570 was added to this advisory.
2026-05-13: CVE-2026-31421 was added to this advisory.