ALASKERNEL-5.10-2025-082


Amazon Linux 2 Security Advisory: ALASKERNEL-5.10-2025-082
Advisory Release Date: 2025-03-03 19:10 Pacific
Advisory Updated Date: 2025-03-13 01:32 Pacific
Severity: Important

Issue Overview:

Integer Overflow or Wraparound vulnerability in Linux kernel on x86 and ARM (md, raid, raid5 modules) allows Forced Integer Overflow. (CVE-2024-23307)

In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Fix use after free in lineinfo_changed_notify (CVE-2024-36899)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (CVE-2024-47707)

In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (CVE-2024-50304)

In the Linux kernel, the following vulnerability has been resolved:

net: fix data-races around sk->sk_forward_alloc (CVE-2024-53124)

In the Linux kernel, the following vulnerability has been resolved:

ceph: give up on paths longer than PATH_MAX (CVE-2024-53685)

In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Fix slab-use-after-free read in sg_release() (CVE-2024-56631)

In the Linux kernel, the following vulnerability has been resolved:

net: defer final 'struct net' free in netns dismantle (CVE-2024-56658)

In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix UAF in blkcg_unpin_online() (CVE-2024-56672)

In the Linux kernel, the following vulnerability has been resolved:

dm array: fix releasing a faulty array block twice in dm_array_cursor_end (CVE-2024-57929)

In the Linux kernel, the following vulnerability has been resolved:

exfat: fix the infinite loop in exfat_readdir() (CVE-2024-57940)

In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Handle CPU state correctly on hotplug (CVE-2024-57951)

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: auth_enable: avoid using current->nsproxy (CVE-2025-21638)

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: rto_min/max: avoid using current->nsproxy (CVE-2025-21639)

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (CVE-2025-21640)

In the Linux kernel, the following vulnerability has been resolved:

afs: Fix the maximum cell name length (CVE-2025-21646)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: clamp maximum hashtable size to INT_MAX (CVE-2025-21648)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (CVE-2025-21653)

In the Linux kernel, the following vulnerability has been resolved:

dm thin: make get_first_thin use rcu-safe list first function (CVE-2025-21664)

In the Linux kernel, the following vulnerability has been resolved:

vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (CVE-2025-21666)

In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: discard packets if the transport changes (CVE-2025-21669)

In the Linux kernel, the following vulnerability has been resolved:

gtp: Destroy device along with udp socket's netns dismantle. (CVE-2025-21678)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix bpf_sk_select_reuseport() memory leak (CVE-2025-21683)

In the Linux kernel, the following vulnerability has been resolved:

vfio/platform: check the bounds of read/write syscalls (CVE-2025-21687)

In the Linux kernel, the following vulnerability has been resolved:

USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (CVE-2025-21689)

In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix softlockup in __read_vmcore (part 2) (CVE-2025-21694)

In the Linux kernel, the following vulnerability has been resolved:

gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (CVE-2025-21699)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.
System reboot is required in order to complete this update.

New Packages:
aarch64:
    kernel-5.10.234-225.895.amzn2.aarch64
    kernel-headers-5.10.234-225.895.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.10.234-225.895.amzn2.aarch64
    perf-5.10.234-225.895.amzn2.aarch64
    perf-debuginfo-5.10.234-225.895.amzn2.aarch64
    python-perf-5.10.234-225.895.amzn2.aarch64
    python-perf-debuginfo-5.10.234-225.895.amzn2.aarch64
    kernel-tools-5.10.234-225.895.amzn2.aarch64
    kernel-tools-devel-5.10.234-225.895.amzn2.aarch64
    kernel-tools-debuginfo-5.10.234-225.895.amzn2.aarch64
    bpftool-5.10.234-225.895.amzn2.aarch64
    bpftool-debuginfo-5.10.234-225.895.amzn2.aarch64
    kernel-devel-5.10.234-225.895.amzn2.aarch64
    kernel-debuginfo-5.10.234-225.895.amzn2.aarch64
    kernel-livepatch-5.10.234-225.895-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.10.234-225.895.amzn2.i686

src:
    kernel-5.10.234-225.895.amzn2.src

x86_64:
    kernel-5.10.234-225.895.amzn2.x86_64
    kernel-headers-5.10.234-225.895.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.10.234-225.895.amzn2.x86_64
    perf-5.10.234-225.895.amzn2.x86_64
    perf-debuginfo-5.10.234-225.895.amzn2.x86_64
    python-perf-5.10.234-225.895.amzn2.x86_64
    python-perf-debuginfo-5.10.234-225.895.amzn2.x86_64
    kernel-tools-5.10.234-225.895.amzn2.x86_64
    kernel-tools-devel-5.10.234-225.895.amzn2.x86_64
    kernel-tools-debuginfo-5.10.234-225.895.amzn2.x86_64
    bpftool-5.10.234-225.895.amzn2.x86_64
    bpftool-debuginfo-5.10.234-225.895.amzn2.x86_64
    kernel-devel-5.10.234-225.895.amzn2.x86_64
    kernel-debuginfo-5.10.234-225.895.amzn2.x86_64
    kernel-livepatch-5.10.234-225.895-1.0-0.amzn2.x86_64