- kernel-4.14.299-223.520.amzn2 (amazon2)
- 4.14.355-280.695.amzn2
- 2025-10-18 09:31:05
- 2025-10-20 11:59:28
- K20251018_01
- CVE-2022-3643
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3643.html
- Patch: 4.14.0/CVE-2022-3643-xen-netback-Ensure-protocol-headers-dont-fall-in-the-non-linear-area.patch
- From: kernel-4.14.304-226.531.amzn2
- CVE-2022-45934
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-45934.html
- Patch: 4.14.0/CVE-2022-45934-Bluetoot-L2CAP-Fix-u8-overflow.patch
- From: kernel-4.14.304-226.531.amzn2
- CVE-2022-47929
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-47929.html
- Patch: 4.14.0/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: kernel-4.14.304-226.531.amzn2
- CVE-2023-0394
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0394.html
- Patch: 4.14.0/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: kernel-4.14.304-226.531.amzn2
- CVE-2023-23455
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23455.html
- Patch: 4.14.0/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-4.14.304-226.531.amzn2
- CVE-2022-49753
- Description:
dmaengine: Fix double increment of client_count in dma_chan_get()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49753.html
- Patch: amazon2/4.14.305-227.531.amzn2/CVE-2022-49753-dmaengine-fix-double-increment-of-client-count-in-dma-chan-get.patch
- From: 4.14.305-227.531.amzn2
- CVE-2023-1073
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1073.html
- Patch: amazon2/4.14.305-227.531.amzn2/CVE-2023-1073-patch-hid-check-empty-report-list-in-hid-validate-values.patch
- From: 4.14.305-227.531.amzn2
- CVE-2023-26545
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: 4.14.0/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: kernel-4.14.309-231.529.amzn2
- CVE-2023-1829
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-1998
- Description:
x86/speculation: Allow enabling STIBP with legacy IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2023-1998
- Patch: 4.14.0/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IBRS.patch
- From: kernel-4.14.309-231.529.amzn2
- CVE-2023-0458
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: 4.14.0/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: kernel-4.14.309-231.529.amzn2
- CVE-2023-2162
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://access.redhat.com/security/cve/CVE-2023-2162
- Patch: 4.14.0/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-the-shost-ipaddress.patch
- From: kernel-4.14.309-231.529.amzn2
- CVE-2023-45862
- Description:
USB: ene_usb6250: Allocate enough memory for full object
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45862.html
- Patch: 4.14.0/CVE-2023-45862-USB-ene_usb6250-Allocate-enough-memory-for-full-object.patch
- From: kernel-4.14.309-231.529.amzn2
- CVE-2023-53100
- Description:
ext4: fix WARNING in ext4_update_inline_data
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53100.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53100-ext4-fix-warning-in-ext4-update-inline-data.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53101
- Description:
ext4: zero i_disksize when initializing the bootloader inode
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53101.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53101-ext4-zero-i-disksize-when-initializing-the-bootloader-inode.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53089
- Description:
ext4: fix task hung in ext4_xattr_delete_inode
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53089.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53089-ext4-fix-task-hung-in-ext4-xattr-delete-inode.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53075
- Description:
ftrace: Fix invalid address access in lookup_rec() when index is 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53075.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53075-ftrace-fix-invalid-address-access-in-lookup-rec-when-index-is-0.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53109
- Description:
net: tunnels: annotate lockless accesses to dev->needed_headroom
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53109.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53109-net-tunnels-annotate-lockless-accesses-to-dev-needed-headroom.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53117
- Description:
fs: prevent out-of-bounds array speculation when closing a file descriptor
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53117.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53117-fs-prevent-out-of-bounds-array-speculation-when-closing-a-file-descriptor.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53141
- Description:
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53141.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53141-ila-do-not-generate-empty-messages-in-ila-xlat-nl-cmd-get-mapping.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53143
- Description:
ext4: fix another off-by-one fsmap error on 1k block filesystems
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53143.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53143-ext4-fix-another-off-by-one-fsmap-error-on-1k-block-filesystems.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53121
- Description:
tcp: tcp_make_synack() can be called from process context
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53121.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53121-tcp-tcp-make-synack-can-be-called-from-process-context.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53125.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53125-net-usb-smsc75xx-limit-packet-length-to-skb-len.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53125.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53125-net-usb-smsc75xx-Move-packet-length-check-to-prevent-kernel-panic-in-skb_pull.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-53116
- Description:
nvmet: avoid potential UAF in nvmet_req_complete()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53116.html
- Patch: amazon2/4.14.311-233.529.amzn2/CVE-2023-53116-nvmet-avoid-potential-uaf-in-nvmet-req-complete.patch
- From: 4.14.311-233.529.amzn2
- CVE-2023-1838
- Description:
Fix double fget() in vhost_net_set_backend()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1838.html
- Patch: 4.14.0/CVE-2023-1838-Fix-double-fget-in-vhost_net_set_backend.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-2002
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2002.html
- Patch: 4.14.0/CVE-2023-2002-01-bluetooth-Perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-2002
- Description:
bluetooth: Add cmd validity checks at the start of hci_sock_ioctl()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2002.html
- Patch: 4.14.0/CVE-2023-2002-02-bluetooth-Add-cmd-validity-checks-at-the-start-of-hci_sock_ioctl.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-2124
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2124.html
- Patch: 4.14.0/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-23454
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23454.html
- Patch: 4.14.0/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-33203
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-33203.html
- Patch: 4.14.0/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-due-to-race-condition.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-2194
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2194.html
- Patch: 4.14.0/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_slimpro_i2c_xfer.patch
- From: kernel-4.14.313-235.533.amzn2
- CVE-2023-31436
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-31436.html
- Patch: 4.14.0/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: kernel-4.14.314-237.533.amzn2
- CVE-2023-32233
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-split-set-destruction-in-deactivate-and-destroy-phase.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nft_hash: fix nft_hash_deactivate
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nft_hash-fix-nft_hash_deactivate.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: bogus EBUSY when deleting set after flush
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-bogus-EBUSY-when-deleting-set-after-flush.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-split-set-destruction-in-deactivate-and-destroy-phase-kpatch.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: bogus EBUSY when deleting set after flush (Revert)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-bogus-EBUSY-when-deleting-set-after-flush-kpatch.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-nf_tables-unbind-kpatch.patch
- From: 4.14.314-238.539
- CVE-2023-32233
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2/4.14.314-238.539.amzn2/CVE-2023-32233-netfilter-kpatch.patch
- From: 4.14.314-238.539
- CVE-2023-28466
- Description:
net: tls: fix possible race condition between
- CVE: https://alas.aws.amazon.com/
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-28466-patch-net-tls-fix-possible-race-condition-between.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-3090
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://alas.aws.amazon.com/
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-3090-patch-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-34256
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://alas.aws.amazon.com/
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-34256-patch-ext4-avoid-a-potential-slab-out-of-bounds-in.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-2269
- Description:
Re: Possible deadlock detected in Linux 6.2.0 in
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2269.html
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-2269-re-possible-deadlock-detected-in-linux-6-2-0-in.patch
- From: 4.14.318-240.529.amzn2
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow RULE_ID to refer to another chain
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2022-2586-netfilter-nf-tables-do-not-allow-rule-id-to-refer-to-another-chain.patch
- From: 4.14.318-240.529.amzn2
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow RULE_ID to refer to another chain
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2022-2586-netfilter-nf-tables-do-not-allow-set-id-to-refer-to-another-table-pre-318.patch
- From: 4.14.318-240.529.amzn2
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow RULE_ID to refer to another chain
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2022-2586-netfilter-nf-tables-do-not-allow-set-id-to-refer-to-another-table-pre-318-kpatch.patch
- From: 4.14.318-240.529.amzn2
- CVE-2022-34918
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-d.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-3111
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.htm
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-3111-1-btrfs-check-return-value-of-btrfs_commit_transaction.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-3111
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.htm
- Patch: amazon2/4.14.318-240.529.amzn2/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fail.patch
- From: 4.14.318-240.529.amzn2
- CVE-2023-3117
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3117.html
- Patch: 4.14.0/CVE-2023-3117-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: kernel-4.14.320-242.534.amzn2
- CVE-2023-35001
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html
- Patch: 4.14.0/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: kernel-4.14.320-242.534.amzn2
- CVE-2023-3609
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3609.html
- Patch: 4.14.0/CVE-2023-3609-net-sched-cls_u32-Fix-reference-counter-leak-leading-to-overflow.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-3611
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3611.html
- Patch: 4.14.0/CVE-2023-3611-net-sched-sch_qfq-account-for-stab-overhead-in-qfq_enqueue.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-3776
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3776.html
- Patch: 4.14.0/CVE-2023-3776-net-sched-cls_fw-Fix-improper-refcount-update-leads-to-use-after-free.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-20569
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-3212
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3212.html
- Patch: amazon2/4.14.322-244.536.amzn2/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 4.14.322-244.536.amzn2
- CVE-2023-1206
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-4128
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://alas.aws.amazon.com/
- Patch: amazon2/4.14.322-244.536.amzn2/CVE-2023-4128-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.14.322-244.536.amzn2
- CVE-2023-4128
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://alas.aws.amazon.com/
- Patch: amazon2/4.14.322-244.536.amzn2/CVE-2023-4128-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.14.322-244.536.amzn2
- CVE-2023-3772
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3772.html
- Patch: 4.14.0/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: kernel-4.14.326-245.539.amzn2
- CVE-2023-4622
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4622.html
- Patch: 4.14.0/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: kernel-4.14.326-245.539.amzn2
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4623.html
- Patch: 4.14.0/CVE-2023-4623-net-sched-sch_hfsc-Ensure-inner-classes-have-fsc-curve.patch
- From: kernel-4.14.326-245.539.amzn2
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html
- Patch: 4.14.0/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: kernel-4.14.326-245.539.amzn2
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html
- Patch: 4.14.0/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: kernel-4.14.326-245.539.amzn2
- CVE-2023-42755
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-4244
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-42753.html
- Patch: 4.14.0/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0.patch
- From: 4.14.326-245.539.amzn2
- CVE-2023-34324
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34324.html
- Patch: amazon2/4.14.327-246.539.amzn2/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU.patch
- From: 4.14.327-246.539.amzn2
- CVE-2023-34324
- Description:
xen/events: replace evtchn_rwlock with RCU (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34324.html
- Patch: amazon2/4.14.327-246.539.amzn2/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 4.14.327-246.539.amzn2
- CVE-2023-3397
- Description:
fs/jfs: Add a mutex named txEnd_lmLogClose_mutex to prevent a race condition between txEnd and lmLogClose functions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3397.html
- Patch: amazon2/4.14.328-248.540.amzn2/CVE-2023-3397-fs_jfs-Add-a-mutex-named-txEnd_lmLogClose_mutex-to-prevent-a-race-condition-between-txEnd-and-lmLogClose-functions.patch
- From: 4.14.328-248.540.amzn2
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-5717.html
- Patch: amazon2/4.14.328-248.540.amzn2/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 4.14.328-248.540.amzn2
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-5717.html
- Patch: amazon2/4.14.328-248.540.amzn2/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.14.328-248.540.amzn2
- CVE-2023-52868
- Description:
thermal: core: prevent potential string overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52868.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-52868-thermal-core-prevent-potential-string-overflow.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-52867
- Description:
drm/radeon: possible buffer overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52867.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-52867-drm-radeon-possible-buffer-overflow.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-52843
- Description:
llc: verify mac len before reading mac header
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52843.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-52843-llc-verify-mac-len-before-reading-mac-header.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-52845
- Description:
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52845.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-52845-tipc-change-nla-policy-for-bearer-related-names-to-nla-nul-string.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-52845
- Description:
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52845.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-52845-tipc-change-nla-policy-for-bearer-related-names-to-nla-nul-string-kpatch.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-3567 CVE-2023-52973
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52973.html
- Patch: amazon2/4.14.330-250.540.amzn2/CVE-2023-3567-patch-vc-screen-move-load-of-struct-vc-data-pointer-in-vcs-read.patch
- From: 4.14.330-250.540.amzn2
- CVE-2023-39198
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39198.html
- Patch: amazon2/4.14.334-252.552.amzn2/CVE-2023-39198-1.patch
- From: 4.14.334-252.552.amzn2
- CVE-2023-6932
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6932.html
- Patch: amazon2/4.14.334-252.552.amzn2/CVE-2023-6932.patch
- From: 4.14.334-252.552.amzn2
- CVE-2023-6606
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6606.html
- Patch: amazon2/4.14.336-253.554.amzn2/CVE-2023-6606-patch-smb-client-fix-oob-in-smbcalcsize.patch
- From: 4.14.336-253.554.amzn2
- CVE-2023-6040
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6040.html
- Patch: amazon2/4.14.336-255.557.amzn2/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family.patch
- From: 4.14.336-255.557.amzn2
- CVE-2023-6546
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6546.html
- Patch: amazon2/4.14.336-255.557.amzn2/CVE-2023-6546-tty-n_gsm-fix-the-UAF-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 4.14.336-255.557.amzn2
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6931.html
- Patch: amazon2/4.14.336-255.557.amzn2/CVE-2023-6931-patch-perf-fix-perf-event-validate-size.patch
- From: 4.14.336-255.557.amzn2
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-1086.html
- Patch: amazon2/4.14.336-256.559.amzn2/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-pre-246.539.patch
- From: kernel-4.14.336-256.559.amzn2
- CVE-2024-23849
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-23849.html
- Patch: amazon2/4.14.336-257.562.amzn2/CVE-2024-23849-patch-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 4.14.336-257.562.amzn2
- CVE-2023-52429
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52429.html
- Patch: amazon2/4.14.336-257.562.amzn2/CVE-2023-52429-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 4.14.336-257.562.amzn2
- CVE-2023-6270
- Description:
Complex adaptation is required, vendor retired ATA over Ethernet driver.
- CVE:
- Patch: skipped/CVE-2023-6270.patch
- From:
- CVE-2024-35807
- Description:
ext4: fix corruption during on-line resize
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-35807.html
- Patch: amazon2/4.14.336-257.566.amzn2/CVE-2024-35807-ext4-fix-corruption-during-on-line-resize-4.14.330-250.540.amzn2.patch
- From: 4.14.336-257.566.amzn2
- CVE-2024-2193 CVE-2024-26602
- Description:
sched/membarrier: reduce the ability to hammer on
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26602.html
- Patch: amazon2/4.14.336-257.568.amzn2/CVE-2024-2193-CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 4.14.336-257.568.amzn2
- CVE-2024-26625
- Description:
llc: call sock_orphan() at release time
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26625.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 4.14.343-259.562.amzn2
- CVE-2024-26898
- Description:
aoe: fix the potential use-after-free problem in
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26898.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 4.14.343-259.562.amzn2
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52464.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2023-52464.patch
- From: 4.14.343-259.562.amzn
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to deadlock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52486.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2023-52486.patch
- From: 4.14.343-259.562.amzn
- CVE-2023-52698
- Description:
calipso: fix memory leak in netlbl_calipso_add_pass()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52698.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2023-52698.patch
- From: 4.14.343-259.562.amzn
- CVE-2024-0607
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0607.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2024-0607.patch
- From: 4.14.343-259.562.amzn
- CVE-2023-46838
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-46838.html
- Patch: amazon2/4.14.343-259.562.amzn2/CVE-2023-46838-xen-netback-don-t-produce-zero-size-skb-frags-301-225.patch
- From: 4.14.343-259.562.amzn
- CVE-2023-52628
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52628.html
- Patch: amazon2/4.14.343-261.564.amzn2/CVE-2023-52628-netfilter-nftables-exthdr-fix-4-byte-stack-oob-write.patch
- From: 4.14.343-261.564.amzn2
- CVE-2023-1077
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1077
- Patch: amazon2/4.14.344-262.563.amzn2/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 4.14.344-262.563
- CVE-2024-35809
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-35809.html
- Patch: amazon2/4.14.345-262.561.amzn2/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal.patch
- From: 4.14.345-262.561.amzn2
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26642.html
- Patch: amazon2/4.14.345-262.561.amzn2/CVE-2024-26642-netfilter-nf-tables-disallow-anonymous-set-with-timeout.patch
- From: 4.14.345-262.561.amzn2
- CVE-2024-25739
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-25739.html
- Patch: amazon2/4.14.345-262.561.amzn2/CVE-2024-25739-ubi-check-for-too-small-leb-size-in-vtbl-code.patch
- From: 4.14.345-262.561.amzn2
- CVE-2023-52620
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52620.html
- Patch: amazon2/4.14.345-262.561.amzn2/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-anonymous-sets.patch
- From: 4.14.345-262.561.amzn2
- CVE-2021-47110
- Description:
x86/kvm: Disable kvmclock on all CPUs on shutdown
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-47110.html
- Patch: amazon2/4.14.348-265.562.amzn2/CVE-2021-47110-x86-kvm-Disable-kvmclock-on-all-CPUs-on-shutdown-326.patch
- From: 4.14.348-265.562.amzn2
- CVE-2023-30456
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-30456.html
- Patch: amazon2/4.14.348-265.562.amzn2/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-CR4.patch
- From: 4.14.348-265.562.amzn2
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-39480.html
- Patch: amazon2/4.14.349-266.564.amzn2/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 4.14.349-266.564.amzn2
- CVE-2024-37353
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-37353.html
- Patch: amazon2/4.14.349-266.564.amzn2/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq-fails.patch
- From: 4.14.349-266.564.amzn2
- CVE-2024-36286
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36286.html
- Patch: amazon2/4.14.349-266.564.amzn2/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in.patch
- From: 4.14.349-266.564.amzn2
- CVE-2024-33621
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-33621.html
- Patch: amazon2/4.14.349-266.564.amzn2/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound.patch
- From: 4.14.349-266.564.amzn2
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2024-36971
- Patch: amazon2/4.14.350-266.564.amzn2/CVE-2024-36971-net-fix-__dst_negative_advice-race-lt-4.14.330.patch
- From: 4.14.350-266.564.amzn2
- CVE-2024-42070
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42070.html
- Patch: amazon2/4.14.350-266.564.amzn2/CVE-2024-42070-netfilter-nf_tables-fully-validate-NFT_DATA_VALUE-on.patch
- From: 4.14.350-266.564.amzn2
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42090.html
- Patch: amazon2/4.14.350-266.564.amzn2/CVE-2024-42090-pinctrl-fix-deadlock-in-create_pinctrl-when-handling.patch
- From: 4.14.350-266.564.amzn2
- CVE-2024-36484
- Description:
net: relax socket state check at accept time.
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36484.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-36484-net-relax-socket-state-check-at-accept-time.patch
- From: 4.14.352-268.568.amzn2
- CVE-2024-41020
- Description:
filelock: Fix fcntl/close race recovery compat path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41020.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-41020-filelock-Fix-fcntl-close-race-recovery-compat-path.patch
- From: 4.14.352-268.568.amzn2
- CVE-2024-41035
- Description:
USB: core: Fix duplicate endpoint bug by clearing
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41035.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-41035-USB-core-Fix-duplicate-endpoint-bug-by-clearing-rese.patch
- From: 4.14.352-268.568.amzn2
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41059.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy_name.patch
- From: 4.14.352-268.568.amzn2
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-39487.html
- Patch: amazon2/4.14.352-267.564.amzn2/CVE-2024-39487-bonding-Fix-out-of-bounds-read-in-bond_option_arp_ip_targets_set.patch
- From: 4.14.352-267.564.amzn2
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory entries
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42104.html
- Patch: amazon2/4.14.352-267.564.amzn2/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory-entries.patch
- From: 4.14.352-267.564.amzn2
- CVE-2024-42148
- Description:
bnx2x: Fix multiple UBSAN array-index-out-of-bounds
- CVE: https://explore.alas.aws.amazon.com/CVE-2024-42148.html
- Patch: amazon2/4.14.352-267.564.amzn2/CVE-2024-42148-bnx2x-fix-multiple-ubsan-array-index-out-of-bounds-kpatch.patch
- From: 4.14.352-267.564.amzn2
- CVE-2024-46763
- Description:
fou: Fix null-ptr-deref in GRO.
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46763.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-46763-fou-Fix-null-ptr-deref-in-GRO.patch
- From: 4.14.352-268.569.amzn2
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html
- Patch: amazon2/4.14.352-268.568.amzn2/CVE-2024-39494-ima-Fix-use-after-free-on-a-dentry-s-dname.name.patch
- From: 4.14.352-268.568.amzn2
- CVE-2024-44944
- Description:
netfilter: ctnetlink: use helper function to calculate expect ID
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-44944.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-44944-netfilter-ctnetlink-use-helper-function-to-calculate-expect-id.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42285.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids-4.14.352-268.569.amzn2.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42284.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-43871
- Description:
driver core: Cast to (void *) with __force for __percpu pointer
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43871.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-43871-driver-core-Cast-to-void-with-__force-for-__percpu-p.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-43871
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43871.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43882.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-42305
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42305.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-43883
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43883.html
- Patch: amazon2/4.14.353-270.569.amzn2/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 4.14.353-270.569.amzn2
- CVE-2024-44987
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-44987.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46781
- Description:
nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46781-nilfs2-fix-use-after-free-of-nilfs_root-in-dirtying-inodes-via-iput.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46781
- Description:
nilfs2: fix missing cleanup on rollforward recovery error
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46781-nilfs2-fix-missing-cleanup-on-rollforward-recovery-error-4.14.344-262.563.amzn2.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46758.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46757.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46756.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46840
- Description:
btrfs: clean up our handling of refs == 0 in snapshot delete
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46840.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46840-btrfs-clean-up-our-handling-of-refs-0-in-snapshot-delete.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46750
- Description:
PCI: Add missing bridge lock to pci_bus_lock()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46750.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46750-pci-add-missing-bridge-lock-to-pci-bus-lock.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46745
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46745.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46780
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46780.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs-4.14.353-270.569.amzn2.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-46829
- Description:
rtmutex: Drop rt_mutex::wait_lock before scheduling
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46829.html
- Patch: amazon2/4.14.355-271.569.amzn2/CVE-2024-46829-rtmutex-drop-rt-mutex-wait-lock-before-scheduling-4.14.353-270.569.amzn2.patch
- From: 4.14.355-271.569.amzn2
- CVE-2024-53095
- Description:
low-scored CVE which inevitably will cause verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-53095.patch
- From:
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-47742.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49936.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50067.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26852.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-26852-net-ipv6-avoid-possible-UAF-in-ip6_route_mpath_notify.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50230.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-47701
- Description:
ext4: return error on ext4_find_inline_entry
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-47701.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-47701-01-ext4-return-error-on-ext4_find_inline_entry.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-47701.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-47701-02-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-49884
- Description:
ext4: avoid ext4_error()'s caused by ENOMEM in the truncate path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49884.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-49884-01-ext4-avoid-ext4_error-s-caused-by-ENOMEM-in-the-truncate-path.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49884.html
- Patch: amazon2/4.14.355-275.582.amzn2/CVE-2024-49884-02-ext4-fix-slab-use-after-free-in-ext4_split_extent_at.patch
- From: 4.14.355-275.582.amzn2
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49860.html
- Patch: amazon2/4.14.355-275.591.amzn2/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 4.14.355-275.591.amzn2
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50055.html
- Patch: amazon2/4.14.355-275.591.amzn2/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 4.14.355-275.591.amzn2
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50279.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50035.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50143.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56631.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49995.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 4.14.355-275.603.amzn2
- CVE-2023-5178
- Description:
tipc: wait and exit until all work queues are done
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-5178.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2021-47163-tipc-wait-and-exit-until-all-work-queues-are-done.patch
- From: 4.14.355-275.603.amzn2
- CVE-2021-47163
- Description:
tipc: wait and exit until all work queues are done
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-47163.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2021-47163-tipc-wait-and-exit-until-all-work-queues-are-done-kpatch.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56642.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-56642-tipc-Fix-use-after-free-of-kernel-socket-in-cleanup_bearer.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49960.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 4.14.355-275.603.amzn2
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21702.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50302.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-35870
- Description:
smb: client: fix UAF in smb2_reconnect_server()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-35870.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-35870-smb-client-fix-uaf-in-smb2-reconnect-server.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-53179
- Description:
smb: client: fix use-after-free of signing key
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-53179.html
- Patch: amazon2/4.14.355-275.603.amzn2/CVE-2024-53179-smb-client-fix-use-after-free-of-signing-key.patch
- From: 4.14.355-275.603.amzn2
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-53057.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56658.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56658.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 4.14.355-276.618.amzn2
- CVE-2025-21753
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21753.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 4.14.355-276.618.amzn2
- CVE-2025-21731
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21731.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 4.14.355-276.618.amzn2
- CVE-2022-49179
- Description:
block, bfq: don't move oom_bfqq
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49179.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2022-49179-block-bfq-don-t-move-oom-bfqq.patch
- From: 4.14.355-276.618.amzn2
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev.patch
- From: 4.14.355-276.618.amzn2
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev-kpatch.patch
- From: 4.14.355-276.618.amzn2
- CVE-2022-49720
- Description:
block: Fix handling of offline queues in blk_mq_alloc_request_hctx()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49720.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2022-49720-block-fix-handling-of-offline-queues-in-blk-mq-alloc-request-hctx.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49883.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-53103.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50033.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-50033-slip-make-slhc_remember-more-robust-against-malicious-packets.patch
- From: 4.14.355-276.618.amzn2
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-56650.html
- Patch: amazon2/4.14.355-276.618.amzn2/CVE-2024-56650-netfilter-x_tables-fix-LED-ID-check-in-led_tg_check.patch
- From: 4.14.355-276.618.amzn2
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21858.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 4.14.355-276.639.amzn2
- CVE-2025-21858
- Description:
geneve: Suppress list corruption splat in geneve_exit_net().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21858.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2025-21858-geneve-Suppress-list-corruption-splat-in-geneve_exit_net.patch
- From: 4.14.355-276.639.amzn2
- CVE-2023-52975
- Description:
scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52975.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2023-52975-scsi-iscsi_tcp-Fix-UAF-during-logout-when-accessing-the-shost-ipaddress.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-47745
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-47745.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-47745-mm-call-the-security_mmap_file-LSM-hook-in-remap_file_pages.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-47745
- Description:
mm: split critical region in remap_file_pages() and invoke LSMs in between
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-47745.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-47745-mm-split-critical-region-in-remap_file_pages-and-invoke-LSMs-in-between.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-49882.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 4.14.355-276.639.amzn2
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21791.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2025-21791-vrf-use-RCU-protection-in-l3mdev_l3_out.patch
- From: 4.14.355-276.639.amzn2
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21796.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2025-21796-nfsd-clear-acl_access-acl_default-after-releasing-them.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50278.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50301.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key_task_permission.patch
- From: 4.14.355-276.639.amzn2
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-50036.html
- Patch: amazon2/4.14.355-276.639.amzn2/CVE-2024-50036-net-do-not-delay-dst_entries_add-in-dst_release.patch
- From: 4.14.355-276.639.amzn2
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21920.html
- Patch: amazon2/4.14.355-277.643.amzn2/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 4.14.355-277.643.amzn2
- CVE-2022-49465
- Description:
blk-throttle: Set BIO_THROTTLED when bio has been throttled
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49465.html
- Patch: amazon2/4.14.355-277.643.amzn2/CVE-2022-49465-blk-throttle-set-bio-throttled-when-bio-has-been-throttled.patch
- From: 4.14.355-277.643.amzn2
- CVE-2022-49168
- Description:
btrfs: do not clean up repair bio if submit fails
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49168.html
- Patch: amazon2/4.14.355-277.643.amzn2/CVE-2022-49168-btrfs-do-not-clean-up-repair-bio-if-submit-fails.patch
- From: 4.14.355-277.643.amzn2
- CVE-2022-49413
- Description:
bfq: Update cgroup information before merging bio
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49413.html
- Patch: amazon2/4.14.355-277.643.amzn2/CVE-2022-49413-bfq-update-cgroup-information-before-merging-bio.patch
- From: 4.14.355-277.643.amzn2
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-22004.html
- Patch: amazon2/4.14.355-277.643.amzn2/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 4.14.355-277.643.amzn2
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-21722.html
- Patch: amazon2/4.14.355-277.647.amzn2/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced-344.patch
- From: 4.14.355-277.647.amzn2
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-58083.html
- Patch: amazon2/4.14.355-277.647.amzn2/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 4.14.355-277.647.amzn2
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-53173.html
- Patch: amazon2/4.14.355-277.647.amzn2/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 4.14.355-277.647.amzn2
- CVE-2023-53137
- Description:
ext4: Fix possible corruption when moving a directory
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0003-ext4-Fix-possible-corruption-when-moving-a-directory.patch
- From: 4.14.355-280.651.amzn2
- CVE-2023-53137
- Description:
ext4: Fix deadlock during directory rename
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0004-ext4-Fix-deadlock-during-directory-rename-309-231.529.patch
- From: 4.14.355-280.651.amzn2
- CVE-2023-53137
- Description:
ext4: fix possible double unlock when moving a directory
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0005-ext4-fix-possible-double-unlock-when-moving-a-direct.patch
- From: 4.14.355-280.651.amzn2
- CVE-2023-53137
- Description:
ext4: Remove ext4 locking of moved directory
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0006-ext4-Remove-ext4-locking-of-moved-directory-309-231.529.patch
- From: 4.14.355-280.651.amzn2
- CVE-2023-53137
- Description:
fs: Establish locking order for unrelated directories
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0007-fs-Establish-locking-order-for-unrelated-directories.patch
- From: 4.14.355-280.651.amzn2
- CVE-2023-53137
- Description:
fs: Lock moved directories
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53137.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2023-53137-0008-fs-Lock-moved-directories.patch
- From: 4.14.355-280.651.amzn2
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37923.html
- Patch: amazon2/4.14.355-280.651.amzn2/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 4.14.355-280.651.amzn2
- CVE-2025-37942
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37942.patch
- From:
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-23150.html
- Patch: amazon2/4.14.355-280.652.amzn2/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 4.14.355-280.652.amzn2
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38051.html
- Patch: amazon2/4.14.355-280.652.amzn2/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 4.14.355-280.652.amzn2
- CVE-2022-50092
- Description:
dm thin: fix use-after-free crash in dm_sm_register_threshold_callback
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50092.html
- Patch: amazon2/4.14.355-280.652.amzn2/CVE-2022-50092-dm-thin-fix-use-after-free-crash-in-dm-sm-register-threshold-callback.patch
- From: 4.14.355-280.652.amzn2
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38075.html
- Patch: amazon2/4.14.355-280.652.amzn2/CVE-2025-38075-scsi-target-iscsi-Fix-timeout-on-deleted-connection.patch
- From: 4.14.355-280.652.amzn2
- CVE-2022-50103
- Description:
ched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50103.html
- Patch: amazon2/4.14.355-280.652.amzn2/CVE-2022-50103-sched-cpuset-Fix-dl_cpu_busy-panic-due-to-empty-cs-c.patch
- From: 4.14.355-280.652.amzn2
- CVE-2025-38177
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://explore.alas.aws.amazon.com/CVE-2025-38177.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38177-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: 4.14.355-280.664.amzn2
- CVE-2022-50073
- Description:
net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50073.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2022-50073-net-tap-null-pointer-derefence-in-dev-parse-header-protocol-when-skb-dev-is-null.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37932.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-37953
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37953.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-37953-sch_htb-make-htb_deactivate-idempotent.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38058.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock.patch
- From: 4.14.355-280.664.amzn2
- CVE-2023-53131
- Description:
SUNRPC: Fix a server shutdown leak
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53131.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2023-53131-sunrpc-fix-a-server-shutdown-leak.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38324.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37798.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-38064
- Description:
virtio: break and reset virtio devices on device_shutdown()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38064-virtio-break-and-reset-virtio-devices-on-device-shutdown.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-38064
- Description:
virtgpu: don't reset on shutdown
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38064-virtgpu-don-t-reset-on-shutdown.patch
- From: 4.14.355-280.664.amzn2
- CVE-2025-38064
- Description:
virtio: break and reset virtio devices on device_shutdown()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38064.html
- Patch: amazon2/4.14.355-280.664.amzn2/CVE-2025-38064-virtio-break-and-reset-virtio-devices-on-device-shutdown-kpatch.patch
- From: 4.14.355-280.664.amzn2
- CVE-2022-49935
- Description:
dma-buf/dma-resv: check if the new fence is really later
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49935.html
- Patch: amazon2/4.14.355-280.672.amzn2/CVE-2022-49935-dma-buf-dma-resv-check-if-the-new-fence-is-really-later.patch
- From: 4.14.355-280.672.amzn2
- CVE-2025-37940
- Description:
ftrace: Add cond_resched() to ftrace_graph_set_hash()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37940.html
- Patch: amazon2/4.14.355-280.672.amzn2/CVE-2025-37940-ftrace-add-cond-resched-to-ftrace-graph-set-hash.patch
- From: 4.14.355-280.672.amzn2
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38086.html
- Patch: amazon2/4.14.355-280.672.amzn2/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 4.14.355-280.672.amzn2
- CVE-2025-38161
- Description:
Complex adaptation required. Do not use binding in the interrupt handler.
- CVE:
- Patch: skipped/CVE-2025-38161.patch
- From:
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38061.html
- Patch: amazon2/4.14.355-280.672.amzn2/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-i.patch
- From: 4.14.355-280.672.amzn2
- CVE-2022-50030
- Description:
scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50030.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2022-50030-scsi-lpfc-prevent-buffer-overflow-crashes-in-debugfs-with-malformed-user-input.patch
- From: 4.14.355-280.679.amzn2
- CVE-2022-50055
- Description:
iavf: Fix adminq error handling
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50055.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2022-50055-iavf-fix-adminq-error-handling.patch
- From: 4.14.355-280.679.amzn2
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38023.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2025-38023-nfs-handle-failure-of-nfs_get_lock_context-in-unlock-path.patch
- From: 4.14.355-280.679.amzn2
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38212.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2025-38212-ipc-fix-to-protect-IPCS-lookups-using-RCU.patch
- From: 4.14.355-280.679.amzn2
- CVE-2025-38215
- Description:
fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38215.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2025-38215-fbdev-fix-do_register_framebuffer-to-prevent-null-ptr-deref-in-fb_videomode_to_var.patch
- From: 4.14.355-280.679.amzn2
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38352.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 4.14.355-280.679.amzn2
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38181.html
- Patch: amazon2/4.14.355-280.679.amzn2/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso_req_set-del-attr.patch
- From: 4.14.355-280.679.amzn2
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52935.html
- Patch: amazon2/4.14.355-280.684.amzn2/CVE-2023-52935-mm-khugepaged-fix-anon_vma-race-301.patch
- From: 4.14.355-280.684.amzn2
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38200.html
- Patch: amazon2/4.14.355-280.684.amzn2/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: 4.14.355-280.684.amzn2
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38499.html
- Patch: amazon2/4.14.355-280.684.amzn2/CVE-2025-38499-clone_private_mnt-make-sure-that-caller-has-CAP_SYS_ADMIN-in-the-right-userns.patch
- From: 4.14.355-280.684.amzn2
- CVE-2025-38193
- Description:
net_sched: sch_sfq: reject invalid perturb period
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38193.html
- Patch: amazon2/4.14.355-280.684.amzn2/CVE-2025-38193-net_sched-sch_sfq-reject-invalid-perturb-period.patch
- From: 4.14.355-280.684.amzn2
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38477.html
- Patch: amazon2/4.14.355-280.684.amzn2/CVE-2025-38477-net-sched-sch_qfq-fix-race-condition-on-qfq_aggregate.patch
- From: 4.14.355-280.684.amzn2
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38386.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38464.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38572.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38415.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38415.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38415.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize-kpatch.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38700.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38665
- Description:
can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38665.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38665-can-netlink-can-changelink-fix-null-pointer-deref-of-struct-can-priv-do-set-mode-564.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-39702.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38713.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-uni2asc.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-38713.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus_uni2asc.patch
- From: 4.14.355-280.695.amzn2
- CVE-2022-50053
- Description:
iavf: Fix reset error handling
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-50053.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2022-50053-iavf-fix-reset-error-handling.patch
- From: 4.14.355-280.695.amzn2
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2025-37995.html
- Patch: amazon2/4.14.355-280.695.amzn2/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 4.14.355-280.695.amzn2
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: amazon2/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: amazon2/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-kpatch.patch
- From: 5.15.0-303.171.5.2.el9uek
- n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.14.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-pti-add-KernelCare-mapping-into-shadow-PGD.patch
- From: N/A
- N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-add-asm-definitions.patch
- From: N/A
- N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- N/A
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.14.0/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- CVE-2023-20588
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: 4.14.0/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2022-3524
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: 4.14.0/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.14.301-224.520.amzn2
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 4.14.0/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for-invalid-SPSM.patch
- From: 4.14.301-224.520.amzn2
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-42896
- Patch: 4.14.0/CVE-2022-42896-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 4.14.301-224.520.amzn2