ALAS2023-2025-1050


Amazon Linux 2023 Security Advisory: ALAS2023-2025-1050
Advisory Released Date: 2025-07-10
Advisory Updated Date: 2025-08-26
Severity: Important

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb (CVE-2024-26739)

In the Linux kernel, the following vulnerability has been resolved:

mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix potential uninit-value access in __ip6_make_skb() (CVE-2024-36903)

In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: do not WARN if iocg was already offlined (CVE-2024-36908)

In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix uninit-value access in __ip_make_skb() (CVE-2024-36927)

In the Linux kernel, the following vulnerability has been resolved:

of: module: add buffer overflow check in of_modalias() (CVE-2024-38541)

In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (CVE-2024-43840)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix qgroup reserve leaks in cow_file_range (CVE-2024-46733)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (CVE-2024-46751)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Prevent tail call between progs attached to different hooks (CVE-2024-50063)

In the Linux kernel, the following vulnerability has been resolved:

bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)

In the Linux kernel, the following vulnerability has been resolved:

hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (CVE-2025-21931)

In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (CVE-2025-22013)

In the Linux kernel, the following vulnerability has been resolved:

sctp: add mutual exclusion in proc_sctp_do_udp_port() (CVE-2025-22062)

In the Linux kernel, the following vulnerability has been resolved:

md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (CVE-2025-23141)

In the Linux kernel, the following vulnerability has been resolved:

sctp: detect and prevent references to a freed transport in sendmsg (CVE-2025-23142)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer in can_accept_new_subflow (CVE-2025-23145)

In the Linux kernel, the following vulnerability has been resolved:

i3c: Add NULL pointer check in i3c_master_queue_ibi() (CVE-2025-23147)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off-by-one error in do_split (CVE-2025-23150)

In the Linux kernel, the following vulnerability has been resolved:

net: vlan: don't propagate flags on open (CVE-2025-23163)

In the Linux kernel, the following vulnerability has been resolved:

ext4: ignore xattrs past end (CVE-2025-37738)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: move the limit validation (CVE-2025-37752)

In the Linux kernel, the following vulnerability has been resolved:

net: tls: explicitly disallow disconnect (CVE-2025-37756)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (CVE-2025-37772)

In the Linux kernel, the following vulnerability has been resolved:

virtiofs: add filesystem context source name check (CVE-2025-37773)

In the Linux kernel, the following vulnerability has been resolved:

isofs: Prevent the use of too small fid (CVE-2025-37780)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix nested key length validation in the set() action (CVE-2025-37789)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)

In the Linux kernel, the following vulnerability has been resolved:

codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (CVE-2025-37798)

In the Linux kernel, the following vulnerability has been resolved:

crypto: null - Use spin lock instead of mutex (CVE-2025-37808)

In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (CVE-2025-37819)

In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (CVE-2025-37820)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix reference leak in pci_register_host_bridge() (CVE-2025-37836)

In the Linux kernel, the following vulnerability has been resolved:

jbd2: remove wrong sb->s_sequence check (CVE-2025-37839)

In the Linux kernel, the following vulnerability has been resolved:

cifs: avoid NULL pointer dereference in dbg call (CVE-2025-37844)

In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Tear down vGIC on failed vCPU creation (CVE-2025-37849)

In the Linux kernel, the following vulnerability has been resolved:

scsi: st: Fix array overflow in st_setup() (CVE-2025-37857)

In the Linux kernel, the following vulnerability has been resolved:

page_pool: avoid infinite loop to schedule delayed worker (CVE-2025-37859)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Silence oversized kvmalloc() warning (CVE-2025-37867)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: decrease sc_count directly if fail to queue dl_recall (CVE-2025-37871)

In the Linux kernel, the following vulnerability has been resolved:

igc: fix PTM cycle trigger logic (CVE-2025-37875)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix deadlock between rcu_tasks_trace and event_mutex. (CVE-2025-37884)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Reset IRTE to host control if *new* route isn't postable (CVE-2025-37885)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: qfq: Fix double list add in class with netem as child qdisc (CVE-2025-37913)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: drr: Fix double list add in class with netem as child qdisc (CVE-2025-37915)

In the Linux kernel, the following vulnerability has been resolved:

vxlan: vnifilter: Fix unlocked deletion of default FDB entry (CVE-2025-37921)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix oob write in trace_seq_to_buffer() (CVE-2025-37923)

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (CVE-2025-37927)

In the Linux kernel, the following vulnerability has been resolved:

dm-bufio: don't schedule in atomic context (CVE-2025-37928)

In the Linux kernel, the following vulnerability has been resolved:

sch_htb: make htb_qlen_notify() idempotent (CVE-2025-37932)

In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value. (CVE-2025-37936)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Verify event formats that have "%*p.." (CVE-2025-37938)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Add cond_resched() to ftrace_graph_set_hash() (CVE-2025-37940)

In the Linux kernel, the following vulnerability has been resolved:

arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (CVE-2025-37948)

In the Linux kernel, the following vulnerability has been resolved:

xenbus: Use kref to track req lifetime (CVE-2025-37949)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Scrub packet on bpf_redirect_peer (CVE-2025-37959)

In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix uninit-value for saddr in do_output_route4 (CVE-2025-37961)

In the Linux kernel, the following vulnerability has been resolved:

arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (CVE-2025-37963)

In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Eliminate window where TLB flushes may be inadvertently skipped (CVE-2025-37964)

In the Linux kernel, the following vulnerability has been resolved:

net: phy: leds: fix memory leak (CVE-2025-37989)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: Flush gso_skb list too during ->change() (CVE-2025-37992)

In the Linux kernel, the following vulnerability has been resolved:

module: ensure that kobject_put() is safe for module type kobjects (CVE-2025-37995)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: fix region locking in hash types (CVE-2025-37997)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: Fix unsafe attribute parsing in output_userspace() (CVE-2025-37998)

In the Linux kernel, the following vulnerability has been resolved:

net/tls: fix kernel panic when alloc_page failed (CVE-2025-38018)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Disable MACsec offload for uplink representor profile (CVE-2025-38020)

In the Linux kernel, the following vulnerability has been resolved:

nfs: handle failure of nfs_get_lock_context in unlock path (CVE-2025-38023)

In the Linux kernel, the following vulnerability has been resolved:

dma-buf: insert memory barrier before updating num_fences (CVE-2025-38095)

In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: make hfsc_qlen_notify() idempotent (CVE-2025-38177)


Affected Packages:

kernel


Issue Correction:
Run dnf update kernel --releasever 2023.8.20250707 or dnf update --advisory ALAS2023-2025-1050 --releasever 2023.8.20250707 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    kernel-libbpf-devel-6.1.140-154.222.amzn2023.aarch64
    kernel-libbpf-6.1.140-154.222.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.140-154.222.amzn2023.aarch64
    bpftool-debuginfo-6.1.140-154.222.amzn2023.aarch64
    kernel-headers-6.1.140-154.222.amzn2023.aarch64
    python3-perf-debuginfo-6.1.140-154.222.amzn2023.aarch64
    kernel-modules-extra-6.1.140-154.222.amzn2023.aarch64
    kernel-tools-6.1.140-154.222.amzn2023.aarch64
    python3-perf-6.1.140-154.222.amzn2023.aarch64
    kernel-tools-devel-6.1.140-154.222.amzn2023.aarch64
    kernel-modules-extra-common-6.1.140-154.222.amzn2023.aarch64
    kernel-libbpf-debuginfo-6.1.140-154.222.amzn2023.aarch64
    kernel-libbpf-static-6.1.140-154.222.amzn2023.aarch64
    perf-6.1.140-154.222.amzn2023.aarch64
    bpftool-6.1.140-154.222.amzn2023.aarch64
    kernel-debuginfo-6.1.140-154.222.amzn2023.aarch64
    perf-debuginfo-6.1.140-154.222.amzn2023.aarch64
    kernel-livepatch-6.1.140-154.222-1.0-0.amzn2023.aarch64
    kernel-6.1.140-154.222.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.140-154.222.amzn2023.aarch64
    kernel-devel-6.1.140-154.222.amzn2023.aarch64

src:
    kernel-6.1.140-154.222.amzn2023.src

x86_64:
    kernel-libbpf-devel-6.1.140-154.222.amzn2023.x86_64
    python3-perf-debuginfo-6.1.140-154.222.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.140-154.222.amzn2023.x86_64
    bpftool-debuginfo-6.1.140-154.222.amzn2023.x86_64
    perf-6.1.140-154.222.amzn2023.x86_64
    kernel-modules-extra-common-6.1.140-154.222.amzn2023.x86_64
    kernel-livepatch-6.1.140-154.222-1.0-0.amzn2023.x86_64
    kernel-tools-devel-6.1.140-154.222.amzn2023.x86_64
    kernel-modules-extra-6.1.140-154.222.amzn2023.x86_64
    bpftool-6.1.140-154.222.amzn2023.x86_64
    kernel-libbpf-6.1.140-154.222.amzn2023.x86_64
    kernel-libbpf-static-6.1.140-154.222.amzn2023.x86_64
    perf-debuginfo-6.1.140-154.222.amzn2023.x86_64
    python3-perf-6.1.140-154.222.amzn2023.x86_64
    kernel-libbpf-debuginfo-6.1.140-154.222.amzn2023.x86_64
    kernel-headers-6.1.140-154.222.amzn2023.x86_64
    kernel-tools-6.1.140-154.222.amzn2023.x86_64
    kernel-debuginfo-6.1.140-154.222.amzn2023.x86_64
    kernel-6.1.140-154.222.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.140-154.222.amzn2023.x86_64
    kernel-devel-6.1.140-154.222.amzn2023.x86_64

Changelog:

2025-08-26: CVE-2025-22126 was added to this advisory.

2025-08-26: CVE-2025-37890 was added to this advisory.

2025-08-26: CVE-2025-38177 was added to this advisory.

2025-08-26: CVE-2025-37932 was added to this advisory.

2025-08-26: CVE-2025-37921 was added to this advisory.

2025-08-26: CVE-2025-37995 was added to this advisory.

2025-08-26: CVE-2025-37938 was added to this advisory.

2025-08-26: CVE-2025-37936 was added to this advisory.