Amazon Linux 2023 Security Advisory: ALAS2023-2025-1145
Advisory Released Date: 2025-08-08
Advisory Updated Date: 2025-08-26
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (CVE-2025-22115)
In the Linux kernel, the following vulnerability has been resolved:
ublk: fix race between io_uring_cmd_complete_in_task and ublk_cancel_cmd (CVE-2025-37906)
In the Linux kernel, the following vulnerability has been resolved:
crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() (CVE-2025-37984)
In the Linux kernel, the following vulnerability has been resolved:
rseq: Fix segfault on registration when rseq_cs is non-zero (CVE-2025-38067)
In the Linux kernel, the following vulnerability has been resolved:
bridge: mcast: Fix use-after-free during router port configuration (CVE-2025-38248)
In the Linux kernel, the following vulnerability has been resolved:
fs/fhandle.c: fix a race in call of has_locked_children() (CVE-2025-38306)
In the Linux kernel, the following vulnerability has been resolved:
eventpoll: don't decrement ep refcount while still holding the ep mutex (CVE-2025-38349)
Affected Packages:
kernel6.12
Issue Correction:
Run dnf update kernel6.12 --releasever 2023.8.20250808 or dnf update --advisory ALAS2023-2025-1145 --releasever 2023.8.20250808 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
perf6.12-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-libbpf-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-libbpf-devel-6.12.40-63.114.amzn2023.aarch64
bpftool6.12-6.12.40-63.114.amzn2023.aarch64
python3-perf6.12-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-tools-devel-6.12.40-63.114.amzn2023.aarch64
kernel6.12-headers-6.12.40-63.114.amzn2023.aarch64
bpftool6.12-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-tools-6.12.40-63.114.amzn2023.aarch64
perf6.12-6.12.40-63.114.amzn2023.aarch64
kernel6.12-libbpf-6.12.40-63.114.amzn2023.aarch64
python3-perf6.12-6.12.40-63.114.amzn2023.aarch64
kernel6.12-tools-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-modules-extra-common-6.12.40-63.114.amzn2023.aarch64
kernel-livepatch-6.12.40-63.114-1.0-0.amzn2023.aarch64
kernel6.12-modules-extra-6.12.40-63.114.amzn2023.aarch64
kernel6.12-libbpf-static-6.12.40-63.114.amzn2023.aarch64
kernel6.12-debuginfo-6.12.40-63.114.amzn2023.aarch64
kernel6.12-6.12.40-63.114.amzn2023.aarch64
kernel6.12-debuginfo-common-aarch64-6.12.40-63.114.amzn2023.aarch64
kernel6.12-devel-6.12.40-63.114.amzn2023.aarch64
src:
kernel6.12-6.12.40-63.114.amzn2023.src
x86_64:
bpftool6.12-6.12.40-63.114.amzn2023.x86_64
kernel-livepatch-6.12.40-63.114-1.0-0.amzn2023.x86_64
kernel6.12-libbpf-devel-6.12.40-63.114.amzn2023.x86_64
kernel6.12-libbpf-debuginfo-6.12.40-63.114.amzn2023.x86_64
python3-perf6.12-debuginfo-6.12.40-63.114.amzn2023.x86_64
kernel6.12-tools-debuginfo-6.12.40-63.114.amzn2023.x86_64
kernel6.12-modules-extra-6.12.40-63.114.amzn2023.x86_64
kernel6.12-tools-6.12.40-63.114.amzn2023.x86_64
kernel6.12-headers-6.12.40-63.114.amzn2023.x86_64
kernel6.12-debuginfo-6.12.40-63.114.amzn2023.x86_64
python3-perf6.12-6.12.40-63.114.amzn2023.x86_64
perf6.12-6.12.40-63.114.amzn2023.x86_64
kernel6.12-modules-extra-common-6.12.40-63.114.amzn2023.x86_64
perf6.12-debuginfo-6.12.40-63.114.amzn2023.x86_64
bpftool6.12-debuginfo-6.12.40-63.114.amzn2023.x86_64
kernel6.12-tools-devel-6.12.40-63.114.amzn2023.x86_64
kernel6.12-libbpf-static-6.12.40-63.114.amzn2023.x86_64
kernel6.12-libbpf-6.12.40-63.114.amzn2023.x86_64
kernel6.12-6.12.40-63.114.amzn2023.x86_64
kernel6.12-debuginfo-common-x86_64-6.12.40-63.114.amzn2023.x86_64
kernel6.12-devel-6.12.40-63.114.amzn2023.x86_64
2025-08-26: CVE-2025-38306 was added to this advisory.
2025-08-26: CVE-2025-38349 was added to this advisory.
2025-08-26: CVE-2025-38248 was added to this advisory.