- kernel-6.1.132-147.221.amzn2023 (amazon2023)
- 6.1.163-186.299.amzn2023
- 2026-03-23 20:12:27
- 2026-03-24 14:10:55
- K20260323_01
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21759.html
- Patch: amazon2023/6.1.134-150.224.amzn2023/CVE-2025-21759-ipv6-mcast-extend-RCU-protection-in-igmp6_send.patch
- From: 6.1.134-150.224.amzn2023
- CVE-2025-37738
- Description:
ext4: ignore xattrs past end
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37738.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-23150.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37797.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37797-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-handling.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37823
- Description:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37823.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37823-net-sched-hfsc-fix-a-potential-uaf-in-hfsc-dequeue-too.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-38541.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26739.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37923.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37928
- Description:
dm-bufio: don't schedule in atomic context
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37928.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37928-dm-bufio-don-t-schedule-in-atomic-context.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-23141
- Description:
KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-23141.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-23141-kvm-x86-acquire-srcu-in-kvm-get-mp-state-to-protect-guest-memory-accesses.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37915.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37913.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37998.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37997.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-37964
- Description:
x86/mm: Eliminate window where TLB flushes may be inadvertently skipped
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37964.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-37964-x86-mm-eliminate-window-where-tlb-flushes-may-be-inadvertently-skipped.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38023.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-38020
- Description:
net/mlx5e: Disable MACsec offload for uplink representor profile
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38020.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-38020-net-mlx5e-disable-macsec-offload-for-uplink-representor-profile.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-38018
- Description:
net/tls: fix kernel panic when alloc_page failed
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38018.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-38018-net-tls-fix-kernel-panic-when-alloc-page-failed.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38095.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-26783
- Description:
mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26783.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-26783-mm-vmscan-fix-a-bug-calling-wakeup-kswapd-with-a-wrong-zone-index.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-43840
- Description:
bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43840.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-43840-bpf-arm64-fix-trampoline-for-bpf-tramp-f-call-orig.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2025-22062
- Description:
sctp: add mutual exclusion in proc_sctp_do_udp_port()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-22062.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2025-22062-sctp-add-mutual-exclusion-in-proc-sctp-do-udp-port.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-46751
- Description:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46751.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-46751-btrfs-don-t-bug-on-when-0-reference-count-at-btrfs-lookup-extent-info.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-36903
- Description:
ipv6: Fix potential uninit-value access in __ip6_make_skb()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36903.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-36903-ipv6-fix-potential-uninit-value-access-in-ip6-make-skb.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-36927
- Description:
ipv4: Fix uninit-value access in __ip_make_skb()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36927.html
- Patch: amazon2023/6.1.140-154.222.amzn2023/CVE-2024-36927-ipv4-fix-uninit-value-access-in-ip-make-skb.patch
- From: 6.1.140-154.222.amzn2023
- CVE-2024-56758
- Description:
btrfs: check folio mapping after unlock in relocate_one_folio()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56758.html
- Patch: amazon2023/6.1.141-155.222.amzn2023/CVE-2024-56758-btrfs-check-folio-mapping-after-unlock-in-relocate-one-folio.patch
- From: 6.1.141-155.222.amzn2023
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38000.html
- Patch: amazon2023/6.1.141-155.222.amzn2023/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue-134.patch
- From: 6.1.141-155.222.amzn2023
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38001.html
- Patch: amazon2023/6.1.141-155.222.amzn2023/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice-134.patch
- From: 6.1.141-155.222.amzn2023
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38004.html
- Patch: amazon2023/6.1.141-155.222.amzn2023/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates.patch
- From: 6.1.141-155.222.amzn2023
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38004.html
- Patch: amazon2023/6.1.141-155.222.amzn2023/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates-kpatch.patch
- From: 6.1.141-155.222.amzn2023
- CVE-2025-38064
- Description:
virtio: break and reset virtio devices on device_shutdown()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38064-virtio-break-and-reset-virtio-devices-on-device_shutdown.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38064
- Description:
virtgpu: don't reset on shutdown
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38064-virtgpu-don-t-reset-on-shutdown.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38064
- Description:
virtio: break and reset virtio devices on device_shutdown()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38064-virtio-kpatch.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38067
- Description:
rseq: Fix segfault on registration when rseq_cs is non-zero
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38067.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38067-rseq-fix-segfault-on-registration-when-rseq_cs-is-non-zero.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38248
- Description:
bridge: mcast: Fix use-after-free during router port configuration
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38248.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38248-bridge-mcast-fix-use-after-free-during-router-port-configuration.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38396
- Description:
fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38396.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38396-fs-export-anon_inode_make_secure_inode-and-fix-secretmem-LSM-bypass.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-37920
- Description:
xsk: Fix race condition in AF_XDP generic RX path
- CVE: https://explore.alas.aws.amazon.com/CVE-2025-37920.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-37920-xsk-Fix-race-condition-in-AF_XDP-generic-RX-path.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-37920
- Description:
xsk: Fix race condition in AF_XDP generic RX path
- CVE: https://explore.alas.aws.amazon.com/CVE-2025-37920.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-37920-xsk-Fix-race-condition-in-AF_XDP-generic-RX-path-adapt.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38244
- Description:
cifs: handle cases where a channel is closed
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38244.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38244-cifs-handle-cases-where-a-channel-is-closed.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38244
- Description:
smb: client: fix potential deadlock when reconnecting channels
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38244.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38244-smb-client-fix-potential-deadlock-when-reconnecting-channels.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38244
- Description:
smb: client: fix potential deadlock when reconnecting channels
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38244.html
- Patch: amazon2023/6.1.147-172.266.amzn2023/CVE-2025-38244-smb-client-fix-potential-deadlock-when-reconnecting-channels-kpatch.patch
- From: 6.1.147-172.266.amzn2023
- CVE-2025-38500
- Description:
xfrm: interface: fix use-after-free after changing collect_md xfrm interface
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38500.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38500-xfrm-interface-fix-use-after-free-after-changing-collect-md-xfrm-interface.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38500
- Description:
xfrm: interface: fix use-after-free after changing collect_md xfrm interface
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38500.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38500-xfrm-interface-fix-use-after-free-after-changing-collect-md-xfrm-interface-kpatch.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38553.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38572.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38587
- Description:
ipv6: fix possible infinite loop in fib6_info_uses_dev()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38587.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38587-ipv6-fix-possible-infinite-loop-in-fib6-info-uses-dev.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38588
- Description:
ipv6: prevent infinite loop in rt6_nlmsg_size()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38588.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38588-ipv6-prevent-infinite-loop-in-rt6-nlmsg-size.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38206.html
- Patch: amazon2023/6.1.148-173.267.amzn2023/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 6.1.148-173.267.amzn2023
- CVE-2025-38614
- Description:
eventpoll: Fix semi-unbounded recursion
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38614.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-38614-eventpoll-Fix-semi-unbounded-recursion.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-38614
- Description:
eventpoll: Fix semi-unbounded recursion
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38614.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-38614-eventpoll-Fix-semi-unbounded-recursion-kpatch.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-38491
- Description:
mptcp: make fallback action and fallback decision atomic
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38491.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-38491-mptcp-make-fallback-action-and-fallback-decision-atomic.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-38491
- Description:
mptcp: make fallback action and fallback decision atomic
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38491.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-38491-mptcp-make-fallback-action-and-fallback-decision-atomic-kpatch.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-37750
- Description:
smb: client: fix UAF in decryption with multichannel
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37750.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-37750-smb-client-fix-uaf-in-decryption-with-multichannel.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39673.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-39673-ppp-fix-race-conditions-in-ppp_fill_forward_path.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39773.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39773.html
- Patch: amazon2023/6.1.150-174.273.amzn2023/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired-kpatch.patch
- From: 6.1.150-174.273.amzn2023
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2025-39845
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39845.patch
- From:
- CVE-2025-39894
- Description:
netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39894.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39894-netfilter-br-netfilter-do-not-check-confirmed-bit-in-br-nf-local-in-after-confirm.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39898
- Description:
e1000e: fix heap overflow in e1000_set_eeprom
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39898.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39898-e1000e-fix-heap-overflow-in-e1000-set-eeprom.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39902
- Description:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39902.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39902-mm-slub-avoid-accessing-metadata-when-pointer-is-invalid-in-object-err.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39914
- Description:
tracing: Silence warning when chunk allocation fails in trace_pid_write
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39914.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39914-tracing-silence-warning-when-chunk-allocation-fails-in-trace-pid-write.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39913.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39880.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39880.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info-kpatch.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39877
- Description:
mm/damon/sysfs: fix use-after-free in state_show()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39877.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39877-mm-damon-sysfs-fix-use-after-free-in-state-show.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39916
- Description:
mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39916.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39916-mm-damon-reclaim-avoid-divide-by-zero-in-damon-reclaim-apply-parameters.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39909
- Description:
mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39909.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39909-mm-damon-lru-sort-avoid-divide-by-zero-in-damon-lru-sort-apply-parameters.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39881
- Description:
kernfs: Fix UAF in polling when open file is released
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39881.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39881-kernfs-fix-uaf-in-polling-when-open-file-is-released.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39883.html
- Patch: amazon2023/6.1.155-176.282.amzn2023/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 6.1.155-176.282.amzn2023
- CVE-2025-40198
- Description:
ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40198.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40198-ext4-avoid-potential-buffer-over-read-in-parse_apply_sb_mount_options.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40100
- Description:
btrfs: fix assertion when building free space tree (dependency)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40100.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40100-btrfs-fix-assertion-when-building-free-space-tree-dep.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40100
- Description:
btrfs: do not assert we found block group item when creating free space tree
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40100.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40100-btrfs-do-not-assert-we-found-block-group-item-when-creating-free-space-tree.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40183.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40183-bpf-Fix-metadata_dst-leak-__bpf_redirect_neigh_v-4-6.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40205
- Description:
btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40205.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40205-btrfs-avoid-potential-out-of-bounds-in-btrfs_encode_fh.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40103
- Description:
smb: client: Fix refcount leak for cifs_sb_tlink
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40103.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40103-smb-client-fix-refcount-leak-for-cifs_sb_tlink.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40099
- Description:
cifs: parse_dfs_referrals: prevent oob on malformed input
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40099.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40099-cifs-parse_dfs_referrals-prevent-oob-on-malformed-input.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40105.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40105-vfs-dont-leak-disconnected-dentries-on-umount.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40207
- Description:
media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40207.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40207-media-v4l2-subdev-fix-alloc-failure-check-in-v4l2_subdev_call_state_try.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40176
- Description:
tls: wait for pending async decryptions if tls_strp_msg_hold fails
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40176.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40176-tls-wait-for-pending-async-decryptions-if-tls_strp_msg_hold-fails.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40194.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40194-cpufreq-intel_pstate-Fix-object-lifecycle-issue-in-update_qos_request.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40201
- Description:
kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40201.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40201-kernel-sys.c-fix-the-racy-usage-of-task_lock-tsk-group_leader-in-sys_prlimit64-paths.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40204.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40204-sctp-Fix-MAC-comparison-to-be-constant-time.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40178.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40178-pid-Add-a-judgment-for-ns-null-in-pid_nr_ns.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40167.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40167-ext4-detect-invalid-INLINE_DATA-+-EXTENTS-flag-combination.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40111.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40111-drm-vmwgfx-Fix-Use-after-free-in-validation.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40187.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp_disposition-sctp_sf_do_5_1D_ce.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-40019.html
- Patch: amazon2023/6.1.158-178.288.amzn2023/CVE-2025-40019-crypto-essiv-Check-ssize-for-decryption-and-in-place-encryption.patch
- From: 6.1.158-178.288.amzn2023
- CVE-2026-23126
- Description:
netdevsim: fix a race issue related to the operation on bpf_bound_progs list
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2026-23126.html
- Patch: amazon2023/6.1.163-186.299.amzn2023/CVE-2026-23126-netdevsim-fix-a-race-issue-related-to-the-operation-on-bpf-bound-progs-list.patch
- From: 6.1.163-186.299.amzn2023
- CVE-2026-23126
- Description:
netdevsim: fix a race issue related to the operation on bpf_bound_progs list
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2026-23126.html
- Patch: amazon2023/6.1.163-186.299.amzn2023/CVE-2026-23126-netdevsim-fix-a-race-issue-related-to-the-operation-on-bpf-bound-progs-list-kpatch.patch
- From: 6.1.163-186.299.amzn2023