Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2026-115
Advisory Released Date: 2026-04-01
Advisory Updated Date: 2026-05-13
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix recvmsg() unconditional requeue (CVE-2026-23066)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/umad: Reject negative data_len in ib_umad_write (CVE-2026-23243)
In the Linux kernel, the following vulnerability has been resolved:
macvlan: observe an RCU grace period in macvlan_common_newlink() error path (CVE-2026-23273)
In the Linux kernel, the following vulnerability has been resolved:
pstore: ram_core: fix incorrect success return when vmap() fails (CVE-2026-43124)
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode (CVE-2026-43130)
In the Linux kernel, the following vulnerability has been resolved:
dm-verity: correctly handle dm_bufio_client_create() failure (CVE-2026-43132)
In the Linux kernel, the following vulnerability has been resolved:
HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (CVE-2026-43136)
In the Linux kernel, the following vulnerability has been resolved:
xfrm6: fix uninitialized saddr in xfrm6_get_saddr() (CVE-2026-43139)
In the Linux kernel, the following vulnerability has been resolved:
HID: magicmouse: Do not crash on missing msc->input (CVE-2026-43140)
In the Linux kernel, the following vulnerability has been resolved:
Revert "PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV" (CVE-2026-43147)
In the Linux kernel, the following vulnerability has been resolved:
HID: hid-pl: handle probe errors (CVE-2026-43152)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: pegasus: enable basic endpoint checking (CVE-2026-43156)
In the Linux kernel, the following vulnerability has been resolved:
xfs: fix freemap adjustments when adding xattrs to leaf blocks (CVE-2026-43158)
In the Linux kernel, the following vulnerability has been resolved:
md/bitmap: fix GPF in write_page caused by resize race (CVE-2026-43163)
In the Linux kernel, the following vulnerability has been resolved:
EFI/CPER: don't dump the entire memory region (CVE-2026-43171)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (CVE-2026-43180)
In the Linux kernel, the following vulnerability has been resolved:
xfs: delete attr leaf freemap entries when empty (CVE-2026-43187)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: xt_tcpmss: check remaining length before reading optlen (CVE-2026-43190)
In the Linux kernel, the following vulnerability has been resolved:
net: consume xmit errors of GSO frames (CVE-2026-43194)
In the Linux kernel, the following vulnerability has been resolved:
PCI: Fix pci_slot_trylock() error handling (CVE-2026-43211)
In the Linux kernel, the following vulnerability has been resolved:
net/rds: No shortcut out of RDS_CONN_ERROR (CVE-2026-43226)
In the Linux kernel, the following vulnerability has been resolved:
net/rds: Clear reconnect pending bit (CVE-2026-43230)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_h323: fix OOB read in decode_choice() (CVE-2026-43233)
In the Linux kernel, the following vulnerability has been resolved:
arm64: Add support for TSV110 Spectre-BHB mitigation (CVE-2026-43261)
In the Linux kernel, the following vulnerability has been resolved:
EFI/CPER: don't go past the ARM processor CPER record buffer (CVE-2026-43266)
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: pretend special inodes as regular files (CVE-2026-43268)
In the Linux kernel, the following vulnerability has been resolved:
ceph: supply snapshot context in ceph_zero_partial_object() (CVE-2026-43273)
In the Linux kernel, the following vulnerability has been resolved:
APEI/GHES: ensure that won't go past CPER allocated record (CVE-2026-43277)
In the Linux kernel, the following vulnerability has been resolved:
drm: Account property blob allocations to memcg (CVE-2026-43287)
In the Linux kernel, the following vulnerability has been resolved:
kexec: derive purgatory entry from symbol (CVE-2026-43289)
In the Linux kernel, the following vulnerability has been resolved:
dm: remove fake timeout to avoid leak request (CVE-2026-43314)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2026-115 to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.10.252-250.992.amzn2.aarch64
kernel-headers-5.10.252-250.992.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.252-250.992.amzn2.aarch64
perf-5.10.252-250.992.amzn2.aarch64
perf-debuginfo-5.10.252-250.992.amzn2.aarch64
python-perf-5.10.252-250.992.amzn2.aarch64
python-perf-debuginfo-5.10.252-250.992.amzn2.aarch64
kernel-tools-5.10.252-250.992.amzn2.aarch64
kernel-tools-devel-5.10.252-250.992.amzn2.aarch64
kernel-tools-debuginfo-5.10.252-250.992.amzn2.aarch64
bpftool-5.10.252-250.992.amzn2.aarch64
bpftool-debuginfo-5.10.252-250.992.amzn2.aarch64
kernel-devel-5.10.252-250.992.amzn2.aarch64
kernel-debuginfo-5.10.252-250.992.amzn2.aarch64
kernel-livepatch-5.10.252-250.992-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.252-250.992.amzn2.i686
src:
kernel-5.10.252-250.992.amzn2.src
x86_64:
kernel-5.10.252-250.992.amzn2.x86_64
kernel-headers-5.10.252-250.992.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.252-250.992.amzn2.x86_64
perf-5.10.252-250.992.amzn2.x86_64
perf-debuginfo-5.10.252-250.992.amzn2.x86_64
python-perf-5.10.252-250.992.amzn2.x86_64
python-perf-debuginfo-5.10.252-250.992.amzn2.x86_64
kernel-tools-5.10.252-250.992.amzn2.x86_64
kernel-tools-devel-5.10.252-250.992.amzn2.x86_64
kernel-tools-debuginfo-5.10.252-250.992.amzn2.x86_64
bpftool-5.10.252-250.992.amzn2.x86_64
bpftool-debuginfo-5.10.252-250.992.amzn2.x86_64
kernel-devel-5.10.252-250.992.amzn2.x86_64
kernel-debuginfo-5.10.252-250.992.amzn2.x86_64
kernel-livepatch-5.10.252-250.992-1.0-0.amzn2.x86_64
2026-05-13: CVE-2026-43287 was added to this advisory.
2026-05-13: CVE-2026-43124 was added to this advisory.
2026-05-13: CVE-2026-43171 was added to this advisory.
2026-05-13: CVE-2026-43152 was added to this advisory.
2026-05-13: CVE-2026-43156 was added to this advisory.
2026-05-13: CVE-2026-43233 was added to this advisory.
2026-05-13: CVE-2026-43158 was added to this advisory.
2026-05-13: CVE-2026-43226 was added to this advisory.
2026-05-13: CVE-2026-43140 was added to this advisory.
2026-05-13: CVE-2026-43266 was added to this advisory.
2026-05-13: CVE-2026-43273 was added to this advisory.
2026-05-13: CVE-2026-43163 was added to this advisory.
2026-05-13: CVE-2026-43289 was added to this advisory.
2026-05-13: CVE-2026-43130 was added to this advisory.
2026-05-13: CVE-2026-43147 was added to this advisory.
2026-05-13: CVE-2026-43314 was added to this advisory.
2026-05-13: CVE-2026-43132 was added to this advisory.
2026-05-13: CVE-2026-43194 was added to this advisory.
2026-05-13: CVE-2026-43139 was added to this advisory.
2026-05-13: CVE-2026-43211 was added to this advisory.
2026-05-13: CVE-2026-43268 was added to this advisory.
2026-05-13: CVE-2026-43277 was added to this advisory.
2026-05-13: CVE-2026-43261 was added to this advisory.
2026-05-13: CVE-2026-43190 was added to this advisory.
2026-05-13: CVE-2026-43136 was added to this advisory.
2026-05-13: CVE-2026-43230 was added to this advisory.
2026-05-13: CVE-2026-43180 was added to this advisory.
2026-05-13: CVE-2026-43187 was added to this advisory.