Amazon Linux 2023 Security Advisory: ALAS2023-2025-1053
Advisory Released Date: 2025-07-10
Advisory Updated Date: 2025-07-29
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
net_sched: Flush gso_skb list too during ->change() (CVE-2025-37992)
In the Linux kernel, the following vulnerability has been resolved:
mm/page_alloc: fix race condition in unaccepted memory handling (CVE-2025-38008)
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator (CVE-2025-38012)
In the Linux kernel, the following vulnerability has been resolved:
HID: bpf: abort dispatch if device destroyed (CVE-2025-38016)
In the Linux kernel, the following vulnerability has been resolved:
net/tls: fix kernel panic when alloc_page failed (CVE-2025-38018)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Disable MACsec offload for uplink representor profile (CVE-2025-38020)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022)
In the Linux kernel, the following vulnerability has been resolved:
nfs: handle failure of nfs_get_lock_context in unlock path (CVE-2025-38023)
In the Linux kernel, the following vulnerability has been resolved:
dma-buf: insert memory barrier before updating num_fences (CVE-2025-38095)
Affected Packages:
kernel6.12
Issue Correction:
Run dnf update kernel6.12 --releasever 2023.8.20250707 or dnf update --advisory ALAS2023-2025-1053 --releasever 2023.8.20250707 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
python3-perf6.12-6.12.30-34.92.amzn2023.aarch64
kernel-livepatch-6.12.30-34.92-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.12.30-34.92.amzn2023.aarch64
kernel-libbpf-devel-6.12.30-34.92.amzn2023.aarch64
kernel-tools-devel-6.12.30-34.92.amzn2023.aarch64
kernel-tools-6.12.30-34.92.amzn2023.aarch64
python3-perf6.12-debuginfo-6.12.30-34.92.amzn2023.aarch64
perf6.12-6.12.30-34.92.amzn2023.aarch64
kernel6.12-modules-extra-6.12.30-34.92.amzn2023.aarch64
kernel-modules-extra-common-6.12.30-34.92.amzn2023.aarch64
kernel-headers-6.12.30-34.92.amzn2023.aarch64
kernel-libbpf-debuginfo-6.12.30-34.92.amzn2023.aarch64
kernel-libbpf-static-6.12.30-34.92.amzn2023.aarch64
perf6.12-debuginfo-6.12.30-34.92.amzn2023.aarch64
kernel-tools-debuginfo-6.12.30-34.92.amzn2023.aarch64
bpftool-6.12.30-34.92.amzn2023.aarch64
kernel-libbpf-6.12.30-34.92.amzn2023.aarch64
kernel6.12-debuginfo-6.12.30-34.92.amzn2023.aarch64
kernel6.12-6.12.30-34.92.amzn2023.aarch64
kernel6.12-debuginfo-common-aarch64-6.12.30-34.92.amzn2023.aarch64
kernel-devel-6.12.30-34.92.amzn2023.aarch64
src:
kernel6.12-6.12.30-34.92.amzn2023.src
x86_64:
kernel-tools-devel-6.12.30-34.92.amzn2023.x86_64
kernel-libbpf-static-6.12.30-34.92.amzn2023.x86_64
python3-perf6.12-6.12.30-34.92.amzn2023.x86_64
kernel-tools-debuginfo-6.12.30-34.92.amzn2023.x86_64
bpftool-6.12.30-34.92.amzn2023.x86_64
kernel-libbpf-debuginfo-6.12.30-34.92.amzn2023.x86_64
kernel-libbpf-devel-6.12.30-34.92.amzn2023.x86_64
kernel-livepatch-6.12.30-34.92-1.0-0.amzn2023.x86_64
python3-perf6.12-debuginfo-6.12.30-34.92.amzn2023.x86_64
kernel-tools-6.12.30-34.92.amzn2023.x86_64
kernel-headers-6.12.30-34.92.amzn2023.x86_64
bpftool-debuginfo-6.12.30-34.92.amzn2023.x86_64
kernel6.12-modules-extra-6.12.30-34.92.amzn2023.x86_64
kernel-libbpf-6.12.30-34.92.amzn2023.x86_64
perf6.12-debuginfo-6.12.30-34.92.amzn2023.x86_64
kernel-modules-extra-common-6.12.30-34.92.amzn2023.x86_64
perf6.12-6.12.30-34.92.amzn2023.x86_64
kernel6.12-debuginfo-6.12.30-34.92.amzn2023.x86_64
kernel6.12-6.12.30-34.92.amzn2023.x86_64
kernel6.12-debuginfo-common-x86_64-6.12.30-34.92.amzn2023.x86_64
kernel-devel-6.12.30-34.92.amzn2023.x86_64