- kernel-5.4.228-131.415.amzn2 (amazon2-5.4)
- 5.4.284-199.382.amzn2
- 2024-11-28 10:02:48
- 2024-12-03 11:15:24
- K20241128_03
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0002-net_fix_a_concurrency_bug_in_l2tp_tunnel_register.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0003-l2tp_Serialize_access_to_sk_user_data_with_sk_callback_lock.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0004-l2tp_Dont_sleep_and_disable_BH_under_writer-side_sk_callback_lock.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23455.html
- Patch: 5.4.0/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23455.html
- Patch: 5.4.0/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-0045, CVSSv2 Score: 6.3
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0045.html
- Patch: 5.4.0/CVE-2023-0045-x86-bugs-Flush-IBP-in-ib_prctl_set.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-47929.html
- Patch: 5.4.0/CVE-2022-47929-net_sched_disallow_noqueue_for_qdisc_classes.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-0394, CVSSv2 Score: 6.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0394.html
- Patch: 5.4.0/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-2196, CVSSv2 Score: 8.8
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2196.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2022-2196-patch-kvm-vmx-execute-ibpb-on-emulated-vm-exit-when-guest-has.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-26545.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-26545-patch-net-mpls-fix-stale-pointer-if-allocation-fails-during.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1078.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-1078-patch-rds-rds-rm-zerocopy-callback-use-list-first-entry.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1077.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-1077-patch-sched-rt-pick-next-rt-entity-check-list-entry.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2162.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0458.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-2985, CVSSv2 Score: 5.5
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2985.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-2985-patch-fs-hfsplus-fix-uaf-issue-in-hfsplus-put-super.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3161.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-3161-patch-fbcon-check-font-dimension-limits.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-45862, CVSSv2 Score: 7.5
- Description:
USB: ene_usb6250: Allocate enough memory for full object
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45862.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-45862-patch-usb-ene-usb6250-allocate-enough-memory-for-full-object.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-7192, CVSSv2 Score: 6.1
- Description:
netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-7192.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-7192-patch-netfilter-ctnetlink-fix-possible-refcount-leak-in.patch
- From: 5.4.235-144.344.amzn2
- CVE-2021-4037, CVSSv2 Score: 7.8
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-4037.html
- Patch: amazon2-5.4/CVE-2021-4037-xfs-fix-up-non-directory-creation-in-SGID-directorie.patch
- From: 5.4.241-150.347.amzn2
- CVE-2022-4744, CVSSv2 Score: 7.8
- Description:
tun: avoid double free in tun_free_netdev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4744.html
- Patch: amazon2-5.4/CVE-2022-4744-tun-avoid-double-free-in-tun_free_netdev.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2124.html
- Patch: 5.4.0/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-28466.html
- Patch: 5.4.0/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2194.html
- Patch: 5.4.0/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: kernel-5.4.241-150.347.amzn2
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-33203.html
- Patch: 5.4.0/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0590.html
- Patch: amazon2-5.4/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2163, CVSSv2 Score: 8.8
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision taints
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2163.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-2163-bpf-Fix-incorrect-verifier-pruning-due-to-missing-register-precision-taints.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-31436, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-31436.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2-5.4/5.4.242-156.349.amzn2/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
- From: 5.4.242-156.349.amzn2
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3090.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: check return value of btrfs_commit_transaction in relocation
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3111-btrfs-check-return-value-of-btrfs_commit_transaction-in-relocation.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fails-in-prepare_to_relocate.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35788.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-35788-net-sched-flower-fix-possible-OOB-write-in-fl_set_geneve_opt.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3141.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race-condition.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
kernel/relay.c: fix read_pos error when multiple readers
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3268.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3268.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay_file_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: modify vcs_size() handling in vcs_read()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3567-vc_screen-modify-vcs_size-handling-in-vcs_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2024-0775, CVSSv2 Score: 7.1
- Description:
ext4: improve error recovery code paths in __ext4_remount()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0775.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2024-0775-ext4-improve-error-recovery-code-paths-in-__ext4_remount.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34256.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-34256-ext4-avoid-a-potential-slab-out-of-bounds-in-ext4_group_desc_csum.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3390.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-3390-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3609.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-3609-net-sched-cls_u32-Fix-reference-counter-leak-leading-to-overflow.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3611.html
- Patch: amazon2-5.4/5.4.250-166.369.amzn2/CVE-2023-3611-net-sched-sch_qfq-account-for-stab-overhead-in-qfq_enqueue.patch
- From: 5.4.250-166.369.amzn2
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3776.html
- Patch: amazon2-5.4/5.4.250-166.369.amzn2/CVE-2023-3776-net-sched-cls_fw-Fix-improper-refcount-update-leads-to-use-after-free.patch
- From: 5.4.250-166.369.amzn2
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: 5.4.0/kpatch-add-asm-definitions-ported.patch
- From: N/A
- CVE-2023-20588, CVSSv2 Score: 6.0
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: amazon2-5.4/5.4.254-169.358.amzn2/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: 5.4.254-169.358.amzn2
- CVE-2023-42755, CVSSv2 Score: 6.5
- Description:
net/sched: Retire rsvp classifier
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-42755.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-42755-retire-rsvp.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45871.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45871.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-42753.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-42753-netfilter-ipset-add-the-missing-ip-set-hash-with-net0-macro-for-ip-set-hash-netportnet-c.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4623.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-4623-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-4921-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.4.0-165.182
- CVE-2023-51042, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-51042.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-51042-drm-amdgpu-fix-potential-fence-use-after-free-v2.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6176.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf-exec-tx-verdict.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-4622, CVSSv2 Score: 7.8
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4622.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-4622-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39193.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input-kpatch.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39189.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-3772, CVSSv2 Score: 5.5
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3772.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-3772-xfrm-add-null-check-in-xfrm-update-ae-params.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39194.html
- Patch: amazon2-5.4/5.4.257-170.359.amzn2/CVE-2023-39194-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.4.257-170.359.amzn2
- CVE-2023-42754, CVSSv2 Score: 4.4
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-42754.html
- Patch: amazon2-5.4/5.4.258-171.360.amzn2/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.4.258-171.360.amzn2
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: refuse attaching if mtd's erasesize is 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-31085.html
- Patch: amazon2-5.4/5.4.258-171.360.amzn2/CVE-2023-31085-patch-ubi-refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.4.258-171.360.amzn2
- CVE-2023-34324, CVSSv2 Score: 6.0
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34324.html
- Patch: amazon2-5.4/5.4.258-171.360.amzn2/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU.patch
- From: 5.4.258-171.360.amzn2
- CVE-2023-34324, CVSSv2 Score: 6.0
- Description:
xen/events: replace evtchn_rwlock with RCU (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34324.html
- Patch: amazon2-5.4/5.4.258-171.360.amzn2/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.4.258-171.360.amzn2
- CVE-2023-5717, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-5717.patch
- From:
- CVE-2023-3397, CVSSv2 Score: 6.3
- Description:
fs/jfs: Add a mutex named txEnd_lmLogClose_mutex to prevent a race condition between txEnd and lmLogClose functions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3397.html
- Patch: amazon2/4.14.328-248.540.amzn2/CVE-2023-3397-fs_jfs-Add-a-mutex-named-txEnd_lmLogClose_mutex-to-prevent-a-race-condition-between-txEnd-and-lmLogClose-functions.patch
- From: 4.14.328-248.540.amzn2
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6606.html
- Patch: amazon2-5.4/5.4.266-178.365.amzn2/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.4.266-178.365.amzn2
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-1086.html
- Patch: amazon2-5.4/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parame.patch
- From: 5.4.268-181.370.amzn2
- CVE-2024-26598, CVSSv2 Score:
- Description:
arm64: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-26598.patch
- From:
- CVE-2023-6270 CVE-2024-26898, CVSSv2 Score: 7.0
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26898.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2023-6270-CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in-aoecmd_cfg_pkts.patch
- From: 5.4.269-183.369.amzn2
- CVE-2024-26625, CVSSv2 Score: 7.8
- Description:
llc: call sock_orphan() at release time
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26625.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2024-26625-llc-call-sock_orphan-at-release-time.patch
- From: 5.4.269-183.369.amzn2
- CVE-2023-52429, CVSSv2 Score: 5.5
- Description:
dm: limit the number of targets and parameter size area.
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52429.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2023-52429-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.4.269-183.369.amzn2
- CVE-2023-52435, CVSSv2 Score: 6.5
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52435.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2023-52435-net-prevent-mss-overflow-in-skb_segment.patch
- From: 5.4.269-183.369.amzn2
- CVE-2024-1151, CVSSv2 Score: 5.5
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-1151.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.4.269-183.369.amzn2
- CVE-2024-0340, CVSSv2 Score: 4.4
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0340.html
- Patch: amazon2-5.4/5.4.269-183.369.amzn2/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-memset.patch
- From: 5.4.269-183.369.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-net-add-atomic_long_t-to-net_device_stats-fields.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-net-add-atomic_long_t-to-net_device_stats-fields-kpatch.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-geneve-make-sure-to-pull-inner-header-in-geneve-rx.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-27024, CVSSv2 Score: 5.5
- Description:
net/rds: fix WARNING in rds_conn_connect_if_down
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-27024.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-27024-net-rds-fix-warning-in-rds-conn-connect-if-down.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26851, CVSSv2 Score: 5.5
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26851.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26851-netfilter-nf-conntrack-h323-add-protection-for-bmp-length.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-33621, CVSSv2 Score: 5.5
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-33621.html
- Patch: amazon2-5.4/5.4.278-191.377.amzn2/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan_process_v-4-6-outbound-259.patch
- From: 5.4.278-191.377.amzn2
- CVE-2024-31076, CVSSv2 Score: 5.5
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-31076.html
- Patch: amazon2-5.4/5.4.278-191.377.amzn2/CVE-2024-31076-genirq-cpuhotplug-x86-vector-Prevent-vector-leak-during-CPU-offline.patch
- From: 5.4.278-191.377.amzn2
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36270.html
- Patch: amazon2023/6.1.94-99.176.amzn2023/CVE-2024-36270-netfilter-tproxy-bail-out-if-IP-has-been-disabled-on-the-device.patch
- From: 6.1.94-99.176.amzn2023
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36286.html
- Patch: amazon2-5.4/5.4.278-191.377.amzn2/CVE-2024-36286-netfilter-nfnetlink_queue-acquire-rcu_read_lock-in-instance_destroy_rcu.patch
- From: 5.4.278-191.377.amzn2
- CVE-2024-37353, CVSSv2 Score: 5.5
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-37353.html
- Patch: amazon2/4.14.349-266.564.amzn2/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq-fails.patch
- From: 4.14.349-266.564.amzn2
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-37356.html
- Patch: amazon2-5.4/5.4.278-191.377.amzn2/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha.patch
- From: 5.4.278-191.377.amzn2
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-37356.html
- Patch: amazon2-5.4/5.4.278-191.377.amzn2/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha-kpatch.patch
- From: 5.4.278-191.377.amzn2
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://linux.oracle.com/cve/CVE-2024-39480.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39480-kdb-Fix-buffer-overflow-during-tab-complete.patch
- From: 5.4.17-2136.334.6
- CVE-2024-42070, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42070.html
- Patch: amazon2-5.4/5.4.279-193.377.amzn2/CVE-2024-42070-netfilter-nf_tables-fully-validate-NFT_DATA_VALUE-on-store-to-data-registers-261.patch
- From: 5.4.279-193.377.amzn2
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42090.html
- Patch: amazon2-5.4/5.4.279-193.377.amzn2/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.4.279-193.377.amzn2
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42096.html
- Patch: amazon2-5.4/5.4.279-193.377.amzn2/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.4.279-193.377.amzn2
- CVE-2023-52803, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52803.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2023-52803-sunrpc-fix-rpc-client-cleaned-up-the-freed-pipefs-dentries-kpatch.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-36484, CVSSv2 Score: 5.5
- Description:
net: relax socket state check at accept time.
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-36484.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-36484-net-relax-socket-state-check-at-accept-time.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41020, CVSSv2 Score: 5.5
- Description:
filelock: Fix fcntl/close race recovery compat path
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41020.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41020-filelock-Fix-fcntl-close-race-recovery-compat-path.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41035, CVSSv2 Score: 5.5
- Description:
USB: core: Fix duplicate endpoint bug by clearing
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41035.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41035-USB-core-Fix-duplicate-endpoint-bug-by-clearing-reserved-bits-in-the-descriptor.patch
- From: 5.4.281-193.378-amzn2
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41041.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41041-udp-Set-SOCK_RCU_FREE-earlier-in-udp_lib_get_port.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41049, CVSSv2 Score: 5.5
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41049.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix_lock_inode-5.4.254-170.358.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41059, CVSSv2 Score: 5.5
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41059.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy_name.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41090, CVSSv2 Score: 7.7
- Description:
tap: add missing verification for short frame
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41090.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41091.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-42154, CVSSv2 Score: 5.5
- Description:
tcp_metrics: validate source addr length
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42154.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-42154, CVSSv2 Score: 5.5
- Description:
tcp_metrics: validate source addr length
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42154.html
- Patch: amazon2-5.4/5.4.281-193.378.amzn2/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.4.281-193.378.amzn2
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43880.html
- Patch: amazon2-5.4/5.4.282-194.378.amzn2/CVE-2024-43880-mlxsw-spectrum_acl_erp-Fix-object-nesting-warning.patch
- From: 5.4.282-194.378.amzn2
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning kpatch
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43880.html
- Patch: amazon2-5.4/5.4.282-194.378.amzn2/CVE-2024-43880-mlxsw-spectrum_acl_erp-Fix-object-nesting-warning-kpatch.patch
- From: 5.4.282-194.378.amzn2
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
driver core: Cast to (void *) with __force for __percpu pointer
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43871.html
- Patch: amazon2-5.4/5.4.282-194.378.amzn2/CVE-2024-43871-driver-core-Cast-to-void-with-__force-for-__percpu-pointer.patch
- From: 5.4.282-194.378.amzn2
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-43871.html
- Patch: amazon2-5.4/5.4.282-194.378.amzn2/CVE-2024-43871-devres-Fix-memory-leakage-caused-by-driver-API-devm_free_percpu.patch
- From: 5.4.282-194.378.amzn2
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41011.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-MMIO-HDP-page-with-large-pages.patch
- From: 5.4.283-195.378.amzn2
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41098.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-41098-ata-libata-core-Fix-null-pointer-dereference-on-error.patch
- From: 5.4.283-195.378.amzn2
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42228.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-42228-drm-amdgpu-Using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.4.283-195.378.amzn2
- CVE-2024-39494, CVSSv2 Score: 7.8
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name-265.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46756.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46757.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46758.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46798.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46722.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46723.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.4.284-196.380.amzn2
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-46782.html
- Patch: amazon2-5.4/5.4.284-196.380.amzn2/CVE-2024-46782-ila-call-nf_unregister_net_hooks-sooner.patch
- From: 5.4.284-196.380.amzn2