ALAS2023-2026-1681


Amazon Linux 2023 Security Advisory: ALAS2023-2026-1681
Advisory Released Date: 2026-05-09
Advisory Updated Date: 2026-05-19
Severity: Important
References: CVE-2025-38192  CVE-2025-38704  CVE-2025-39748  CVE-2025-39764  CVE-2025-40135  CVE-2025-68206  CVE-2025-68239  CVE-2025-68265  CVE-2025-71067  CVE-2025-71161  CVE-2025-71269  CVE-2026-23100  CVE-2026-23113  CVE-2026-23141  CVE-2026-23154  CVE-2026-23157  CVE-2026-23204  CVE-2026-23270  CVE-2026-23271  CVE-2026-23274  CVE-2026-23277  CVE-2026-23292  CVE-2026-23293  CVE-2026-23296  CVE-2026-23300  CVE-2026-23303  CVE-2026-23304  CVE-2026-23317  CVE-2026-23319  CVE-2026-23321  CVE-2026-23340  CVE-2026-23343  CVE-2026-23351  CVE-2026-23352  CVE-2026-23356  CVE-2026-23359  CVE-2026-23362  CVE-2026-23368  CVE-2026-23381  CVE-2026-23388  CVE-2026-23391  CVE-2026-23392  CVE-2026-23397  CVE-2026-23398  CVE-2026-23401  CVE-2026-23414  CVE-2026-23439  CVE-2026-23443  CVE-2026-23449  CVE-2026-23452  CVE-2026-23455  CVE-2026-23456  CVE-2026-23457  CVE-2026-23458  CVE-2026-31392  CVE-2026-31399  CVE-2026-31400  CVE-2026-31402  CVE-2026-31403  CVE-2026-31414  CVE-2026-31415  CVE-2026-31416  CVE-2026-31418  CVE-2026-31421  CVE-2026-31422  CVE-2026-31423  CVE-2026-31424  CVE-2026-31426  CVE-2026-31427  CVE-2026-31428  CVE-2026-31434  CVE-2026-31446  CVE-2026-31447  CVE-2026-31448  CVE-2026-31450  CVE-2026-31452  CVE-2026-31453  CVE-2026-31454  CVE-2026-31455  CVE-2026-31458  CVE-2026-31466  CVE-2026-31467  CVE-2026-31469  CVE-2026-31473  CVE-2026-31480  CVE-2026-31492  CVE-2026-31495  CVE-2026-31496  CVE-2026-31503  CVE-2026-31504  CVE-2026-31508  CVE-2026-31515  CVE-2026-31518  CVE-2026-31519  CVE-2026-31521  CVE-2026-31523  CVE-2026-31524  CVE-2026-31540  CVE-2026-31546  CVE-2026-31555  CVE-2026-31570  CVE-2026-31674  CVE-2026-31678  CVE-2026-31679  CVE-2026-31680  CVE-2026-31682  CVE-2026-31695  CVE-2026-31738  CVE-2026-31752  CVE-2026-31759  CVE-2026-31781  CVE-2026-31788  CVE-2026-43013  CVE-2026-43024  CVE-2026-43025  CVE-2026-43026  CVE-2026-43027  CVE-2026-43028  CVE-2026-43030  CVE-2026-43035  CVE-2026-43037  CVE-2026-43038  CVE-2026-43040  CVE-2026-43043  CVE-2026-43046  CVE-2026-43047  CVE-2026-43054  CVE-2026-43057  CVE-2026-43060  CVE-2026-43061  CVE-2026-43065  CVE-2026-43066  CVE-2026-43068  CVE-2026-43252  CVE-2026-43265  CVE-2026-43281  CVE-2026-43328  CVE-2026-43329  CVE-2026-43333  CVE-2026-43339  CVE-2026-43341  CVE-2026-43359  CVE-2026-43360  CVE-2026-43361  CVE-2026-43363  CVE-2026-43365  CVE-2026-43366  CVE-2026-43383  CVE-2026-43405  CVE-2026-43406  CVE-2026-43407  CVE-2026-43411  CVE-2026-43420  CVE-2026-43427  CVE-2026-43428  CVE-2026-43432  CVE-2026-43439  CVE-2026-43441  CVE-2026-43445  CVE-2026-43448  CVE-2026-43449  CVE-2026-43450  CVE-2026-43451  CVE-2026-43452  CVE-2026-43453  CVE-2026-43466  CVE-2026-43468  CVE-2026-43472  CVE-2026-43475  CVE-2026-43483 
FAQs regarding Amazon Linux ALAS/CVE Severity

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

net: clear the dst when changing skb protocol (CVE-2025-38192)

In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access (CVE-2025-38704)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Forget ranges when refining tnum after JSET (CVE-2025-39748)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: remove refcounting in expectation dumpers (CVE-2025-39764)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_xmit() (CVE-2025-40135)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: add seqadj extension for natted connections (CVE-2025-68206)

In the Linux kernel, the following vulnerability has been resolved:

binfmt_misc: restore write access before closing files opened by open_exec() (CVE-2025-68239)

In the Linux kernel, the following vulnerability has been resolved:

nvme: fix admin request_queue lifetime (CVE-2025-68265)

In the Linux kernel, the following vulnerability has been resolved:

ntfs: set dummy blocksize to read boot_block when mounting (CVE-2025-71067)

In the Linux kernel, the following vulnerability has been resolved:

dm-verity: disable recursive forward error correction (CVE-2025-71161)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not free data reservation in fallback from inline due to -ENOSPC (CVE-2025-71269)

In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix hugetlb_pmd_shared() (CVE-2026-23100)

In the Linux kernel, the following vulnerability has been resolved:

io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (CVE-2026-23113)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: check for inline extents in range_is_hole_in_parent() (CVE-2026-23141)

In the Linux kernel, the following vulnerability has been resolved:

net: fix segmentation of forwarding fraglist GRO (CVE-2026-23154)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not strictly require dirty metadata threshold for metadata writepages (CVE-2026-23157)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (CVE-2026-23270)

In the Linux kernel, the following vulnerability has been resolved:

perf: Fix __perf_event_overflow() vs perf_remove_from_context() race (CVE-2026-23271)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (CVE-2026-23274)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (CVE-2026-23277)

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix recursive locking in __configfs_open_file() (CVE-2026-23292)

In the Linux kernel, the following vulnerability has been resolved:

net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (CVE-2026-23293)

In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix refcount leak for tagset_refcnt (CVE-2026-23296)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop (CVE-2026-23300)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: Don't log plaintext credentials in cifs_set_cifscreds (CVE-2026-23303)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (CVE-2026-23304)

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (CVE-2026-23317)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (CVE-2026-23319)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: in-kernel: always mark signal+subflow endp as used (CVE-2026-23321)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs (CVE-2026-23340)

In the Linux kernel, the following vulnerability has been resolved:

xdp: produce a warning when calculated tailroom is negative (CVE-2026-23343)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: split gc into unlink and reclaim phase (CVE-2026-23351)

In the Linux kernel, the following vulnerability has been resolved:

x86/efi: defer freeing of boot services memory (CVE-2026-23352)

In the Linux kernel, the following vulnerability has been resolved:

drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() (CVE-2026-23356)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stack-out-of-bounds write in devmap (CVE-2026-23359)

In the Linux kernel, the following vulnerability has been resolved:

can: bcm: fix locking for bcm_op runtime updates (CVE-2026-23362)

In the Linux kernel, the following vulnerability has been resolved:

net: phy: register phy led_triggers during probe to avoid AB-BA deadlock (CVE-2026-23368)

In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (CVE-2026-23381)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check metadata block offset is within range (CVE-2026-23388)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_CT: drop pending enqueued packets on template removal (CVE-2026-23391)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: release flowtable after rcu grace period on error (CVE-2026-23392)

In the Linux kernel, the following vulnerability has been resolved:

nfnetlink_osf: validate individual option lengths in fingerprints (CVE-2026-23397)

In the Linux kernel, the following vulnerability has been resolved:

icmp: fix NULL pointer dereference in icmp_tag_validation() (CVE-2026-23398)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (CVE-2026-23401)

In the Linux kernel, the following vulnerability has been resolved:

tls: Purge async_hold in tls_decrypt_async_wait() (CVE-2026-23414)

In the Linux kernel, the following vulnerability has been resolved:

udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n (CVE-2026-23439)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix (CVE-2026-23443)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: teql: Fix double-free in teql_master_xmit (CVE-2026-23449)

In the Linux kernel, the following vulnerability has been resolved:

PM: runtime: Fix a race condition related to device removal (CVE-2026-23452)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() (CVE-2026-23455)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case (CVE-2026-23456)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() (CVE-2026-23457)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() (CVE-2026-23458)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix krb5 mount with username option (CVE-2026-31392)

In the Linux kernel, the following vulnerability has been resolved:

nvdimm/bus: Fix potential use after free in asynchronous initialization (CVE-2026-31399)

In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix cache_request leak in cache_release (CVE-2026-31400)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (CVE-2026-31402)

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd (CVE-2026-31403)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_expect: use expect->helper (CVE-2026-31414)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid overflows in ip6_datagram_send_ctl() (CVE-2026-31415)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_log: account for netlink header size (CVE-2026-31416)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: drop logically empty buckets in mtype_del (CVE-2026-31418)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_fw: fix NULL pointer dereference on shared blocks (CVE-2026-31421)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_flow: fix NULL pointer dereference on shared blocks (CVE-2026-31422)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() (CVE-2026-31423)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP (CVE-2026-31424)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() (CVE-2026-31426)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp (CVE-2026-31427)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD (CVE-2026-31428)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix leak of kobject name for sub-group space_info (CVE-2026-31434)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in update_super_work when racing with umount (CVE-2026-31446)

In the Linux kernel, the following vulnerability has been resolved:

ext4: reject mount if bigalloc with s_first_data_block != 0 (CVE-2026-31447)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid infinite loops caused by residual data (CVE-2026-31448)

In the Linux kernel, the following vulnerability has been resolved:

ext4: publish jinode after initialization (CVE-2026-31450)

In the Linux kernel, the following vulnerability has been resolved:

ext4: convert inline data to extents when truncate exceeds inline size (CVE-2026-31452)

In the Linux kernel, the following vulnerability has been resolved:

xfs: avoid dereferencing log items after push callbacks (CVE-2026-31453)

In the Linux kernel, the following vulnerability has been resolved:

xfs: save ailp before dropping the AIL lock in push callbacks (CVE-2026-31454)

In the Linux kernel, the following vulnerability has been resolved:

xfs: stop reclaim before pushing AIL during unmount (CVE-2026-31455)

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] (CVE-2026-31458)

In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix folio isn't locked in softleaf_to_folio() (CVE-2026-31466)

In the Linux kernel, the following vulnerability has been resolved:

erofs: add GFP_NOIO in the bio completion if needed (CVE-2026-31467)

In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false (CVE-2026-31469)

In the Linux kernel, the following vulnerability has been resolved:

media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex (CVE-2026-31473)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix potential deadlock in cpu hotplug with osnoise (CVE-2026-31480)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Initialize free_qp completion before using it (CVE-2026-31492)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: use netlink policy range checks (CVE-2026-31495)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_expect: skip expectations in other netns via proc (CVE-2026-31496)

In the Linux kernel, the following vulnerability has been resolved:

udp: Fix wildcard bind conflict check when using hash2 (CVE-2026-31503)

In the Linux kernel, the following vulnerability has been resolved:

net: fix fanout UAF in packet_release() via NETDEV_UP race (CVE-2026-31504)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Avoid releasing netdev before teardown completes (CVE-2026-31508)

In the Linux kernel, the following vulnerability has been resolved:

af_key: validate families in pfkey_send_migrate() (CVE-2026-31515)

In the Linux kernel, the following vulnerability has been resolved:

esp: fix skb leak with espintcp and async crypto (CVE-2026-31518)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create (CVE-2026-31519)

In the Linux kernel, the following vulnerability has been resolved:

module: Fix kernel panic when a symbol st_shndx is out of bounds (CVE-2026-31521)

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: ensure we're polling a polled queue (CVE-2026-31523)

In the Linux kernel, the following vulnerability has been resolved:

HID: asus: avoid memory leak in asus_report_fixup() (CVE-2026-31524)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Check set_default_submission() before deferencing (CVE-2026-31540)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: fix NULL deref in bond_debug_rlb_hash_show (CVE-2026-31546)

In the Linux kernel, the following vulnerability has been resolved:

futex: Clear stale exiting pointer in futex_lock_pi() retry path (CVE-2026-31555)

In the Linux kernel, the following vulnerability has been resolved:

can: gw: fix OOB heap access in cgw_csum_crc8_rel() (CVE-2026-31570)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() (CVE-2026-31674)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: defer tunnel netdev_put to RCU release (CVE-2026-31678)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: validate MPLS set/set_masked payload length (CVE-2026-31679)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown (CVE-2026-31680)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options (CVE-2026-31682)

In the Linux kernel, the following vulnerability has been resolved:

wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free (CVE-2026-31695)

In the Linux kernel, the following vulnerability has been resolved:

vxlan: validate ND option lengths in vxlan_na_create (CVE-2026-31738)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: validate ND option lengths (CVE-2026-31752)

In the Linux kernel, the following vulnerability has been resolved:

usb: ulpi: fix double free in ulpi_register_interface() error path (CVE-2026-31759)

In the Linux kernel, the following vulnerability has been resolved:

drm/ioc32: stop speculation on the drm_compat_ioctl path (CVE-2026-31781)

In the Linux kernel, the following vulnerability has been resolved:

xen/privcmd: restrict usage in unprivileged domU (CVE-2026-31788)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: lag: Check for LAG device before creating debugfs (CVE-2026-43013)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject immediate NF_QUEUE verdict (CVE-2026-43024)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: ignore explicit helper on new expectations (CVE-2026-43025)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent (CVE-2026-43026)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_helper: pass helper to expect cleanup (CVE-2026-43027)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: ensure names are nul-terminated (CVE-2026-43028)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix regsafe() for pointers to packet (CVE-2026-43030)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak (CVE-2026-43035)

In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: clear skb2->cb[] in ip4ip6_err() (CVE-2026-43037)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() (CVE-2026-43038)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak (CVE-2026-43040)

In the Linux kernel, the following vulnerability has been resolved:

crypto: af-alg - fix NULL pointer dereference in scatterwalk (CVE-2026-43043)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: reject root items with drop_progress and zero drop_level (CVE-2026-43046)

In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: Check to ensure report responses match the request (CVE-2026-43047)

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: tcm_loop: Drain commands in target_reset handler (CVE-2026-43054)

In the Linux kernel, the following vulnerability has been resolved:

net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback (CVE-2026-43057)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: drop pending enqueued packets on removal (CVE-2026-43060)

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: Fix TX deadlock when using DMA (CVE-2026-43061)

In the Linux kernel, the following vulnerability has been resolved:

ext4: always drain queued discard work in ext4_mb_release() (CVE-2026-43065)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths (CVE-2026-43066)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal() (CVE-2026-43068)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: in-kernel: always set ID as avail when rm endp (CVE-2026-43252)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block() (CVE-2026-43265)

In the Linux kernel, the following vulnerability has been resolved:

mailbox: Prevent out-of-bounds access in fw_mbox_index_xlate() (CVE-2026-43281)

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path (CVE-2026-43328)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: strictly check for maximum number of actions (CVE-2026-43329)

In the Linux kernel, the following vulnerability has been resolved:

bpf: reject direct access to nullable PTR_TO_BUF pointers (CVE-2026-43333)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible UaF in addrconf_permanent_addr() (CVE-2026-43339)

In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: ioam6: prevent schema length wraparound in trace fill (CVE-2026-43341)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix transaction abort on set received ioctl due to item overflow (CVE-2026-43359)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix transaction abort on file creation due to name hash collision (CVE-2026-43360)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix transaction abort when snapshotting received subvolumes (CVE-2026-43361)

In the Linux kernel, the following vulnerability has been resolved:

x86/apic: Disable x2apic on resume if the kernel expects so (CVE-2026-43363)

In the Linux kernel, the following vulnerability has been resolved:

xfs: fix undersized l_iclog_roundoff values (CVE-2026-43365)

In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: check if target buffer list is still legacy on recycle (CVE-2026-43366)

In the Linux kernel, the following vulnerability has been resolved:

net/tcp-md5: Fix MAC comparison to be constant-time (CVE-2026-43383)

In the Linux kernel, the following vulnerability has been resolved:

libceph: Use u32 for non-negative values in ceph_monmap_decode() (CVE-2026-43405)

In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds reads in process_message_header() (CVE-2026-43406)

In the Linux kernel, the following vulnerability has been resolved:

libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() (CVE-2026-43407)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix divide-by-zero in tipc_sk_filter_connect() (CVE-2026-43411)

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix i_nlink underrun during async unlink (CVE-2026-43420)

In the Linux kernel, the following vulnerability has been resolved:

usb: class: cdc-wdm: fix reordering issue in read code path (CVE-2026-43427)

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Limit the length of unkillable synchronous timeouts (CVE-2026-43428)

In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix memory leak in xhci_disable_slot() (CVE-2026-43432)

In the Linux kernel, the following vulnerability has been resolved:

cgroup: fix race between task migration and iteration (CVE-2026-43439)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled (CVE-2026-43441)

In the Linux kernel, the following vulnerability has been resolved:

e1000/e1000e: Fix leak in DMA error cleanup (CVE-2026-43445)

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: Fix race bug in nvme_poll_irqdisable() (CVE-2026-43448)

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set (CVE-2026-43449)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_cthelper: fix OOB read in nfnl_cthelper_dump_table() (CVE-2026-43450)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path (CVE-2026-43451)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: guard option walkers against 1-byte tail reads (CVE-2026-43452)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop() (CVE-2026-43453)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery (CVE-2026-43466)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix deadlock between devlink lock and esw->wq (CVE-2026-43468)

In the Linux kernel, the following vulnerability has been resolved:

unshare: fix unshare_fs() handling (CVE-2026-43472)

In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (CVE-2026-43475)

In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated (CVE-2026-43483)


Affected Packages:

kernel


Issue Correction:
Run dnf update kernel --releasever 2023.11.20260509 or dnf update --advisory ALAS2023-2026-1681 --releasever 2023.11.20260509 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    kernel-libbpf-static-6.1.168-202.320.amzn2023.aarch64
    kernel-livepatch-6.1.168-202.320-1.0-0.amzn2023.aarch64
    kernel-libbpf-debuginfo-6.1.168-202.320.amzn2023.aarch64
    perf-debuginfo-6.1.168-202.320.amzn2023.aarch64
    kernel-headers-6.1.168-202.320.amzn2023.aarch64
    perf-6.1.168-202.320.amzn2023.aarch64
    kernel-tools-6.1.168-202.320.amzn2023.aarch64
    bpftool-6.1.168-202.320.amzn2023.aarch64
    kernel-6.1.168-202.320.amzn2023.aarch64
    kernel-modules-extra-6.1.168-202.320.amzn2023.aarch64
    bpftool-debuginfo-6.1.168-202.320.amzn2023.aarch64
    python3-perf-debuginfo-6.1.168-202.320.amzn2023.aarch64
    kernel-libbpf-6.1.168-202.320.amzn2023.aarch64
    kernel-debuginfo-6.1.168-202.320.amzn2023.aarch64
    kernel-libbpf-devel-6.1.168-202.320.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.168-202.320.amzn2023.aarch64
    kernel-tools-devel-6.1.168-202.320.amzn2023.aarch64
    kernel-modules-extra-common-6.1.168-202.320.amzn2023.aarch64
    python3-perf-6.1.168-202.320.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.168-202.320.amzn2023.aarch64
    kernel-devel-6.1.168-202.320.amzn2023.aarch64

src:
    kernel-6.1.168-202.320.amzn2023.src

x86_64:
    perf-debuginfo-6.1.168-202.320.amzn2023.x86_64
    kernel-libbpf-debuginfo-6.1.168-202.320.amzn2023.x86_64
    perf-6.1.168-202.320.amzn2023.x86_64
    kernel-libbpf-6.1.168-202.320.amzn2023.x86_64
    kernel-modules-extra-common-6.1.168-202.320.amzn2023.x86_64
    python3-perf-debuginfo-6.1.168-202.320.amzn2023.x86_64
    kernel-livepatch-6.1.168-202.320-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.168-202.320.amzn2023.x86_64
    kernel-modules-extra-6.1.168-202.320.amzn2023.x86_64
    python3-perf-6.1.168-202.320.amzn2023.x86_64
    bpftool-debuginfo-6.1.168-202.320.amzn2023.x86_64
    kernel-6.1.168-202.320.amzn2023.x86_64
    kernel-tools-devel-6.1.168-202.320.amzn2023.x86_64
    kernel-tools-6.1.168-202.320.amzn2023.x86_64
    kernel-headers-6.1.168-202.320.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.168-202.320.amzn2023.x86_64
    kernel-libbpf-static-6.1.168-202.320.amzn2023.x86_64
    bpftool-6.1.168-202.320.amzn2023.x86_64
    kernel-libbpf-devel-6.1.168-202.320.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.168-202.320.amzn2023.x86_64
    kernel-devel-6.1.168-202.320.amzn2023.x86_64

Changelog:

2026-05-19: CVE-2026-43420 was added to this advisory.

2026-05-19: CVE-2026-43452 was added to this advisory.

2026-05-19: CVE-2026-43329 was added to this advisory.

2026-05-19: CVE-2026-43472 was added to this advisory.

2026-05-19: CVE-2026-43359 was added to this advisory.

2026-05-19: CVE-2026-43483 was added to this advisory.

2026-05-19: CVE-2026-43427 was added to this advisory.

2026-05-19: CVE-2026-43466 was added to this advisory.

2026-05-19: CVE-2026-43328 was added to this advisory.

2026-05-13: CVE-2026-43341 was added to this advisory.

2026-05-13: CVE-2026-43428 was added to this advisory.

2026-05-13: CVE-2026-43450 was added to this advisory.

2026-05-13: CVE-2026-43365 was added to this advisory.

2026-05-13: CVE-2026-43445 was added to this advisory.

2026-05-13: CVE-2026-43453 was added to this advisory.

2026-05-13: CVE-2026-43432 was added to this advisory.

2026-05-13: CVE-2026-43475 was added to this advisory.

2026-05-13: CVE-2026-43363 was added to this advisory.

2026-05-13: CVE-2026-43439 was added to this advisory.

2026-05-13: CVE-2026-43448 was added to this advisory.

2026-05-13: CVE-2026-43366 was added to this advisory.

2026-05-13: CVE-2026-43339 was added to this advisory.

2026-05-13: CVE-2026-43411 was added to this advisory.

2026-05-13: CVE-2026-43451 was added to this advisory.

2026-05-13: CVE-2026-43468 was added to this advisory.

2026-05-13: CVE-2026-43406 was added to this advisory.

2026-05-13: CVE-2026-43265 was added to this advisory.

2026-05-13: CVE-2026-43449 was added to this advisory.

2026-05-13: CVE-2026-43405 was added to this advisory.

2026-05-13: CVE-2026-43333 was added to this advisory.

2026-05-13: CVE-2026-43383 was added to this advisory.

2026-05-13: CVE-2026-43360 was added to this advisory.

2026-05-13: CVE-2026-43407 was added to this advisory.

2026-05-13: CVE-2026-43361 was added to this advisory.

2026-05-13: CVE-2026-43441 was added to this advisory.

2026-05-09: CVE-2026-43065 was added to this advisory.

2026-05-09: CVE-2026-43061 was added to this advisory.

2026-05-09: CVE-2026-43066 was added to this advisory.

2026-05-09: CVE-2026-31695 was added to this advisory.

2026-05-09: CVE-2026-31781 was added to this advisory.

2026-05-09: CVE-2026-43060 was added to this advisory.

2026-05-09: CVE-2026-43054 was added to this advisory.

2026-05-09: CVE-2026-43281 was added to this advisory.

2026-05-09: CVE-2026-43252 was added to this advisory.

2026-05-09: CVE-2026-31759 was added to this advisory.

2026-05-09: CVE-2026-43068 was added to this advisory.