CVE-2022-50030 Affecting kernel-livepatch-4.14.355-280.679 package, versions <0:1.0-0.amzn2


Severity

Recommended
0.0
high
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2-KERNELLIVEPATCH414355280679-12508422
  • published5 Sept 2025
  • disclosed18 Jun 2025

Introduced: 18 Jun 2025

CVE-2022-50030  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2 kernel-livepatch-4.14.355-280.679 to version 0:1.0-0.amzn2 or higher.
This issue was patched in ALAS2-2025-2988.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-livepatch-4.14.355-280.679 package and not the kernel-livepatch-4.14.355-280.679 package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input

Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, leaving space for NULL terminators.

CVSS Base Scores

version 3.1