Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2026-112
Advisory Released Date: 2026-02-19
Advisory Updated Date: 2026-02-19
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
RDMA/restrack: Release MR restrack when delete (CVE-2022-50822)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: reject duplicate device on updates (CVE-2025-38678)
In the Linux kernel, the following vulnerability has been resolved:
fs: writeback: fix use-after-free in __mark_inode_dirty() (CVE-2025-39866)
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow (CVE-2025-39998)
In the Linux kernel, the following vulnerability has been resolved:
scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (CVE-2025-40001)
In the Linux kernel, the following vulnerability has been resolved:
ipvs: Defer ip_vs_ftp unregister during netns cleanup (CVE-2025-40018)
In the Linux kernel, the following vulnerability has been resolved:
crypto: essiv - Check ssize for decryption and in-place encryption (CVE-2025-40019)
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O (CVE-2025-40026)
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: check the return value of pinmux_ops::get_function_name() (CVE-2025-40030)
In the Linux kernel, the following vulnerability has been resolved:
Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (CVE-2025-40035)
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (CVE-2025-40042)
In the Linux kernel, the following vulnerability has been resolved:
fs: udf: fix OOB read in lengthAllocDescs handling (CVE-2025-40044)
In the Linux kernel, the following vulnerability has been resolved:
uio_hv_generic: Let userspace take care of interrupt mask (CVE-2025-40048)
In the Linux kernel, the following vulnerability has been resolved:
Squashfs: fix uninit-value in squashfs_get_parent (CVE-2025-40049)
In the Linux kernel, the following vulnerability has been resolved:
pps: fix warning in pps_register_cdev when register device fail (CVE-2025-40070)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Explicitly check accesses to bpf_sock_addr (CVE-2025-40078)
In the Linux kernel, the following vulnerability has been resolved:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (CVE-2025-40081)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix null-deref in agg_dequeue (CVE-2025-40083)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Define a proc_layoutcommit for the FlexFiles layout type (CVE-2025-40087)
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (CVE-2025-40088)
In the Linux kernel, the following vulnerability has been resolved:
vfs: Don't leak disconnected dentries on umount (CVE-2025-40105)
In the Linux kernel, the following vulnerability has been resolved:
crypto: rng - Ensure set_ent is always present (CVE-2025-40109)
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (CVE-2025-40115)
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx (CVE-2025-40125)
In the Linux kernel, the following vulnerability has been resolved:
dm: fix NULL pointer dereference in __dm_suspend() (CVE-2025-40134)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (CVE-2025-40140)
In the Linux kernel, the following vulnerability has been resolved:
mm: hugetlb: avoid soft lockup when mprotect to large memory area (CVE-2025-40153)
In the Linux kernel, the following vulnerability has been resolved:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination (CVE-2025-40167)
In the Linux kernel, the following vulnerability has been resolved:
net/ip6_tunnel: Prevent perpetual tunnel growth (CVE-2025-40173)
In the Linux kernel, the following vulnerability has been resolved:
pid: Add a judgment for ns null in pid_nr_ns (CVE-2025-40178)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (CVE-2025-40183)
In the Linux kernel, the following vulnerability has been resolved:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (CVE-2025-40187)
In the Linux kernel, the following vulnerability has been resolved:
ext4: guard against EA inode refcount underflow in xattr update (CVE-2025-40190)
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (CVE-2025-40194)
In the Linux kernel, the following vulnerability has been resolved:
media: mc: Clear minor number before put device (CVE-2025-40197)
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (CVE-2025-40198)
In the Linux kernel, the following vulnerability has been resolved:
Squashfs: reject negative file sizes in squashfs_read_inode() (CVE-2025-40200)
In the Linux kernel, the following vulnerability has been resolved:
sctp: Fix MAC comparison to be constant-time (CVE-2025-40204)
In the Linux kernel, the following vulnerability has been resolved:
btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (CVE-2025-40205)
In the Linux kernel, the following vulnerability has been resolved:
ACPI: video: Fix use-after-free in acpi_video_switch_brightness() (CVE-2025-40211)
In the Linux kernel, the following vulnerability has been resolved:
PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (CVE-2025-40219)
In the Linux kernel, the following vulnerability has been resolved:
fuse: fix livelock in synchronous file put from fuseblk workers (CVE-2025-40220)
In the Linux kernel, the following vulnerability has been resolved:
vsock: fix lock inversion in vsock_assign_transport() (CVE-2025-40231)
In the Linux kernel, the following vulnerability has been resolved:
sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240)
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() (CVE-2025-40243)
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (CVE-2025-40244)
In the Linux kernel, the following vulnerability has been resolved:
vsock: Ignore signal/timeout on connect() if already established (CVE-2025-40248)
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: remove never-working support for setting nsh fields (CVE-2025-40254)
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix a race in mptcp_pm_del_add_timer() (CVE-2025-40257)
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)
In the Linux kernel, the following vulnerability has been resolved:
scsi: sg: Do not sleep in atomic context (CVE-2025-40259)
In the Linux kernel, the following vulnerability has been resolved:
fs/proc: fix uaf in proc_readdir_de() (CVE-2025-40271)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: free copynotify stateid in nfs4_free_ol_stateid() (CVE-2025-40273)
In the Linux kernel, the following vulnerability has been resolved:
tipc: Fix use-after-free in tipc_mon_reinit_self(). (CVE-2025-40280)
In the Linux kernel, the following vulnerability has been resolved:
sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto (CVE-2025-40281)
In the Linux kernel, the following vulnerability has been resolved:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (CVE-2025-40304)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Sync pending IRQ work before freeing ring buffer (CVE-2025-40319)
In the Linux kernel, the following vulnerability has been resolved:
fbdev: bitblit: bound-check glyph index in bit_putcs* (CVE-2025-40322)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Fix crash in nfsd4_read_release() (CVE-2025-40324)
In the Linux kernel, the following vulnerability has been resolved:
sctp: Prevent TOCTOU out-of-bounds write (CVE-2025-40331)
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: sddr55: Reject out-of-bound new_pba (CVE-2025-40345)
In the Linux kernel, the following vulnerability has been resolved:
arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (CVE-2025-40346)
In the Linux kernel, the following vulnerability has been resolved:
hfs: validate record offset in hfsplus_bmap_alloc (CVE-2025-40349)
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (CVE-2025-40351)
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: fix field-spanning memcpy warning in AH output (CVE-2025-40363)
In the Linux kernel, the following vulnerability has been resolved:
cpufreq/longhaul: handle NULL policy in longhaul_exit (CVE-2025-68177)
In the Linux kernel, the following vulnerability has been resolved:
nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing (CVE-2025-68185)
In the Linux kernel, the following vulnerability has been resolved:
udp_tunnel: use netdev_warn() instead of netdev_WARN() (CVE-2025-68191)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (CVE-2025-68192)
In the Linux kernel, the following vulnerability has been resolved:
mptcp: Fix proto fallback detection with BPF (CVE-2025-68227)
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() (CVE-2025-68229)
In the Linux kernel, the following vulnerability has been resolved:
ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (CVE-2025-68241)
In the Linux kernel, the following vulnerability has been resolved:
net: netpoll: fix incorrect refcount handling causing incorrect cleanup (CVE-2025-68245)
In the Linux kernel, the following vulnerability has been resolved:
libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: Fix memory leak in USB bulk transport (CVE-2025-68288)
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix memory leak in cifs_construct_tcon() (CVE-2025-68295)
In the Linux kernel, the following vulnerability has been resolved:
usbnet: Prevents free active kevent (CVE-2025-68312)
In the Linux kernel, the following vulnerability has been resolved:
usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (CVE-2025-68331)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2026-112 to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.10.247-246.989.amzn2.aarch64
kernel-headers-5.10.247-246.989.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.247-246.989.amzn2.aarch64
perf-5.10.247-246.989.amzn2.aarch64
perf-debuginfo-5.10.247-246.989.amzn2.aarch64
python-perf-5.10.247-246.989.amzn2.aarch64
python-perf-debuginfo-5.10.247-246.989.amzn2.aarch64
kernel-tools-5.10.247-246.989.amzn2.aarch64
kernel-tools-devel-5.10.247-246.989.amzn2.aarch64
kernel-tools-debuginfo-5.10.247-246.989.amzn2.aarch64
bpftool-5.10.247-246.989.amzn2.aarch64
bpftool-debuginfo-5.10.247-246.989.amzn2.aarch64
kernel-devel-5.10.247-246.989.amzn2.aarch64
kernel-debuginfo-5.10.247-246.989.amzn2.aarch64
kernel-livepatch-5.10.247-246.989-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.247-246.989.amzn2.i686
src:
kernel-5.10.247-246.989.amzn2.src
x86_64:
kernel-5.10.247-246.989.amzn2.x86_64
kernel-headers-5.10.247-246.989.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.247-246.989.amzn2.x86_64
perf-5.10.247-246.989.amzn2.x86_64
perf-debuginfo-5.10.247-246.989.amzn2.x86_64
python-perf-5.10.247-246.989.amzn2.x86_64
python-perf-debuginfo-5.10.247-246.989.amzn2.x86_64
kernel-tools-5.10.247-246.989.amzn2.x86_64
kernel-tools-devel-5.10.247-246.989.amzn2.x86_64
kernel-tools-debuginfo-5.10.247-246.989.amzn2.x86_64
bpftool-5.10.247-246.989.amzn2.x86_64
bpftool-debuginfo-5.10.247-246.989.amzn2.x86_64
kernel-devel-5.10.247-246.989.amzn2.x86_64
kernel-debuginfo-5.10.247-246.989.amzn2.x86_64
kernel-livepatch-5.10.247-246.989-1.0-0.amzn2.x86_64