Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2025-095
Advisory Released Date: 2025-06-23
Advisory Updated Date: 2025-07-01
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_mirred: don't override retval if we already lost the skb (CVE-2024-26739)
In the Linux kernel, the following vulnerability has been resolved:
of: module: add buffer overflow check in of_modalias() (CVE-2024-38541)
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (CVE-2024-46751)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix helper writes to read-only maps (CVE-2024-49861)
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (CVE-2025-37819)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: qfq: Fix double list add in class with netem as child qdisc (CVE-2025-37913)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: drr: Fix double list add in class with netem as child qdisc (CVE-2025-37915)
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix oob write in trace_seq_to_buffer() (CVE-2025-37923)
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (CVE-2025-37927)
In the Linux kernel, the following vulnerability has been resolved:
xenbus: Use kref to track req lifetime (CVE-2025-37949)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: Flush gso_skb list too during ->change() (CVE-2025-37992)
In the Linux kernel, the following vulnerability has been resolved:
module: ensure that kobject_put() is safe for module type kobjects (CVE-2025-37995)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ipset: fix region locking in hash types (CVE-2025-37997)
In the Linux kernel, the following vulnerability has been resolved:
openvswitch: Fix unsafe attribute parsing in output_userspace() (CVE-2025-37998)
In the Linux kernel, the following vulnerability has been resolved:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (CVE-2025-38000)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (CVE-2025-38001)
In the Linux kernel, the following vulnerability has been resolved:
can: bcm: add missing rcu read protection for procfs content (CVE-2025-38003)
In the Linux kernel, the following vulnerability has been resolved:
can: bcm: add locking for bcm_op runtime updates (CVE-2025-38004)
In the Linux kernel, the following vulnerability has been resolved:
nfs: handle failure of nfs_get_lock_context in unlock path (CVE-2025-38023)
In the Linux kernel, the following vulnerability has been resolved:
vxlan: Annotate FDB data races (CVE-2025-38037)
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051)
In the Linux kernel, the following vulnerability has been resolved:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (CVE-2025-38058)
In the Linux kernel, the following vulnerability has been resolved:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write() (CVE-2025-38061)
In the Linux kernel, the following vulnerability has been resolved:
dm cache: prevent BUG_ON by blocking retries on failed device resumes (CVE-2025-38066)
In the Linux kernel, the following vulnerability has been resolved:
libnvdimm/labels: Fix divide error in nd_label_data_init() (CVE-2025-38072)
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix timeout on deleted connection (CVE-2025-38075)
In the Linux kernel, the following vulnerability has been resolved:
crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.10.238-231.953.amzn2.aarch64
kernel-headers-5.10.238-231.953.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.238-231.953.amzn2.aarch64
perf-5.10.238-231.953.amzn2.aarch64
perf-debuginfo-5.10.238-231.953.amzn2.aarch64
python-perf-5.10.238-231.953.amzn2.aarch64
python-perf-debuginfo-5.10.238-231.953.amzn2.aarch64
kernel-tools-5.10.238-231.953.amzn2.aarch64
kernel-tools-devel-5.10.238-231.953.amzn2.aarch64
kernel-tools-debuginfo-5.10.238-231.953.amzn2.aarch64
bpftool-5.10.238-231.953.amzn2.aarch64
bpftool-debuginfo-5.10.238-231.953.amzn2.aarch64
kernel-devel-5.10.238-231.953.amzn2.aarch64
kernel-debuginfo-5.10.238-231.953.amzn2.aarch64
kernel-livepatch-5.10.238-231.953-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.238-231.953.amzn2.i686
src:
kernel-5.10.238-231.953.amzn2.src
x86_64:
kernel-5.10.238-231.953.amzn2.x86_64
kernel-headers-5.10.238-231.953.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.238-231.953.amzn2.x86_64
perf-5.10.238-231.953.amzn2.x86_64
perf-debuginfo-5.10.238-231.953.amzn2.x86_64
python-perf-5.10.238-231.953.amzn2.x86_64
python-perf-debuginfo-5.10.238-231.953.amzn2.x86_64
kernel-tools-5.10.238-231.953.amzn2.x86_64
kernel-tools-devel-5.10.238-231.953.amzn2.x86_64
kernel-tools-debuginfo-5.10.238-231.953.amzn2.x86_64
bpftool-5.10.238-231.953.amzn2.x86_64
bpftool-debuginfo-5.10.238-231.953.amzn2.x86_64
kernel-devel-5.10.238-231.953.amzn2.x86_64
kernel-debuginfo-5.10.238-231.953.amzn2.x86_64
kernel-livepatch-5.10.238-231.953-1.0-0.amzn2.x86_64
2025-07-01: CVE-2025-37997 was added to this advisory.
2025-07-01: CVE-2025-38023 was added to this advisory.
2025-07-01: CVE-2025-38061 was added to this advisory.
2025-07-01: CVE-2025-38072 was added to this advisory.
2025-07-01: CVE-2025-38051 was added to this advisory.
2025-07-01: CVE-2025-38075 was added to this advisory.
2025-07-01: CVE-2025-38079 was added to this advisory.
2025-07-01: CVE-2025-38003 was added to this advisory.
2025-07-01: CVE-2025-38058 was added to this advisory.
2025-07-01: CVE-2025-38037 was added to this advisory.
2025-07-01: CVE-2025-38066 was added to this advisory.