ALAS2-2025-3013


Amazon Linux 2 Security Advisory: ALAS2-2025-3013
Advisory Released Date: 2025-09-29
Advisory Updated Date: 2025-09-29
Severity: Important

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix reset error handling (CVE-2022-50053)

In the Linux kernel, the following vulnerability has been resolved:

module: ensure that kobject_put() is safe for module type kobjects (CVE-2025-37995)

In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Refuse to evaluate a method if arguments are missing (CVE-2025-38386)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize (CVE-2025-38415)

In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close(). (CVE-2025-38464)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572)

In the Linux kernel, the following vulnerability has been resolved:

can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (CVE-2025-38665)

In the Linux kernel, the following vulnerability has been resolved:

scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (CVE-2025-38700)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (CVE-2025-38713)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Also allocate and copy hash for reading of filter files (CVE-2025-39689)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time (CVE-2025-39702)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel or yum update --advisory ALAS2-2025-3013 to update your system.
System reboot is required in order to complete this update.

New Packages:
aarch64:
    kernel-4.14.355-280.695.amzn2.aarch64
    kernel-headers-4.14.355-280.695.amzn2.aarch64
    kernel-debuginfo-common-aarch64-4.14.355-280.695.amzn2.aarch64
    perf-4.14.355-280.695.amzn2.aarch64
    perf-debuginfo-4.14.355-280.695.amzn2.aarch64
    python-perf-4.14.355-280.695.amzn2.aarch64
    python-perf-debuginfo-4.14.355-280.695.amzn2.aarch64
    kernel-tools-4.14.355-280.695.amzn2.aarch64
    kernel-tools-devel-4.14.355-280.695.amzn2.aarch64
    kernel-tools-debuginfo-4.14.355-280.695.amzn2.aarch64
    kernel-devel-4.14.355-280.695.amzn2.aarch64
    kernel-debuginfo-4.14.355-280.695.amzn2.aarch64

i686:
    kernel-headers-4.14.355-280.695.amzn2.i686

src:
    kernel-4.14.355-280.695.amzn2.src

x86_64:
    kernel-4.14.355-280.695.amzn2.x86_64
    kernel-headers-4.14.355-280.695.amzn2.x86_64
    kernel-debuginfo-common-x86_64-4.14.355-280.695.amzn2.x86_64
    perf-4.14.355-280.695.amzn2.x86_64
    perf-debuginfo-4.14.355-280.695.amzn2.x86_64
    python-perf-4.14.355-280.695.amzn2.x86_64
    python-perf-debuginfo-4.14.355-280.695.amzn2.x86_64
    kernel-tools-4.14.355-280.695.amzn2.x86_64
    kernel-tools-devel-4.14.355-280.695.amzn2.x86_64
    kernel-tools-debuginfo-4.14.355-280.695.amzn2.x86_64
    kernel-devel-4.14.355-280.695.amzn2.x86_64
    kernel-debuginfo-4.14.355-280.695.amzn2.x86_64
    kernel-livepatch-4.14.355-280.695-1.0-0.amzn2.x86_64