Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2025-063
Advisory Release Date: 2025-02-12 23:07 Pacific
Advisory Updated Date: 2025-03-13 01:32 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
Integer Overflow or Wraparound vulnerability in Linux kernel on x86 and ARM (md, raid, raid5 modules) allows Forced Integer Overflow. (CVE-2024-23307)
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: RFCOMM: Fix not validating setsockopt user input (CVE-2024-35966)
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify (CVE-2024-36899)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (CVE-2024-47707)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix timer use-after-free on failed mount (CVE-2024-49960)
In the Linux kernel, the following vulnerability has been resolved:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (CVE-2024-50304)
In the Linux kernel, the following vulnerability has been resolved:
net: fix data-races around sk->sk_forward_alloc (CVE-2024-53124)
In the Linux kernel, the following vulnerability has been resolved:
ceph: give up on paths longer than PATH_MAX (CVE-2024-53685)
In the Linux kernel, the following vulnerability has been resolved:
scsi: sg: Fix slab-use-after-free read in sg_release() (CVE-2024-56631)
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: Fix UAF in blkcg_unpin_online() (CVE-2024-56672)
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fix TCP options overflow. (CVE-2024-57882)
In the Linux kernel, the following vulnerability has been resolved:
topology: Keep the cpumask unchanged when printing cpumap (CVE-2024-57917)
In the Linux kernel, the following vulnerability has been resolved:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end (CVE-2024-57929)
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix the infinite loop in exfat_readdir() (CVE-2024-57940)
In the Linux kernel, the following vulnerability has been resolved:
hrtimers: Handle CPU state correctly on hotplug (CVE-2024-57951)
In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (CVE-2025-21631)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (CVE-2025-21636)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: udp_port: avoid using current->nsproxy (CVE-2025-21637)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: auth_enable: avoid using current->nsproxy (CVE-2025-21638)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: rto_min/max: avoid using current->nsproxy (CVE-2025-21639)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (CVE-2025-21640)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX (CVE-2025-21648)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (CVE-2025-21653)
In the Linux kernel, the following vulnerability has been resolved:
dm thin: make get_first_thin use rcu-safe list first function (CVE-2025-21664)
In the Linux kernel, the following vulnerability has been resolved:
filemap: avoid truncating 64-bit offset to 32 bits (CVE-2025-21665)
In the Linux kernel, the following vulnerability has been resolved:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (CVE-2025-21666)
In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
In the Linux kernel, the following vulnerability has been resolved:
gtp: Destroy device along with udp socket's netns dismantle. (CVE-2025-21678)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix bpf_sk_select_reuseport() memory leak (CVE-2025-21683)
In the Linux kernel, the following vulnerability has been resolved:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (CVE-2025-21690)
In the Linux kernel, the following vulnerability has been resolved:
net: sched: fix ets qdisc OOB Indexing (CVE-2025-21692)
In the Linux kernel, the following vulnerability has been resolved:
fs/proc: fix softlockup in __read_vmcore (part 2) (CVE-2025-21694)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.15.178-120.178.amzn2.aarch64
kernel-headers-5.15.178-120.178.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.15.178-120.178.amzn2.aarch64
perf-5.15.178-120.178.amzn2.aarch64
perf-debuginfo-5.15.178-120.178.amzn2.aarch64
python-perf-5.15.178-120.178.amzn2.aarch64
python-perf-debuginfo-5.15.178-120.178.amzn2.aarch64
kernel-tools-5.15.178-120.178.amzn2.aarch64
kernel-tools-devel-5.15.178-120.178.amzn2.aarch64
kernel-tools-debuginfo-5.15.178-120.178.amzn2.aarch64
bpftool-5.15.178-120.178.amzn2.aarch64
bpftool-debuginfo-5.15.178-120.178.amzn2.aarch64
kernel-devel-5.15.178-120.178.amzn2.aarch64
kernel-debuginfo-5.15.178-120.178.amzn2.aarch64
kernel-livepatch-5.15.178-120.178-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.15.178-120.178.amzn2.i686
src:
kernel-5.15.178-120.178.amzn2.src
x86_64:
kernel-5.15.178-120.178.amzn2.x86_64
kernel-headers-5.15.178-120.178.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.15.178-120.178.amzn2.x86_64
perf-5.15.178-120.178.amzn2.x86_64
perf-debuginfo-5.15.178-120.178.amzn2.x86_64
python-perf-5.15.178-120.178.amzn2.x86_64
python-perf-debuginfo-5.15.178-120.178.amzn2.x86_64
kernel-tools-5.15.178-120.178.amzn2.x86_64
kernel-tools-devel-5.15.178-120.178.amzn2.x86_64
kernel-tools-debuginfo-5.15.178-120.178.amzn2.x86_64
bpftool-5.15.178-120.178.amzn2.x86_64
bpftool-debuginfo-5.15.178-120.178.amzn2.x86_64
kernel-devel-5.15.178-120.178.amzn2.x86_64
kernel-debuginfo-5.15.178-120.178.amzn2.x86_64
kernel-livepatch-5.15.178-120.178-1.0-0.amzn2.x86_64
2025-03-13: CVE-2024-57940 was added to this advisory.
2025-03-13: CVE-2025-21648 was added to this advisory.
2025-03-13: CVE-2024-23307 was added to this advisory.
2025-03-13: CVE-2025-21694 was added to this advisory.
2025-03-13: CVE-2025-21665 was added to this advisory.
2025-03-13: CVE-2024-57929 was added to this advisory.
2025-03-13: CVE-2025-21640 was added to this advisory.
2025-03-13: CVE-2024-57951 was added to this advisory.
2025-03-13: CVE-2024-53124 was added to this advisory.
2025-03-13: CVE-2025-21637 was added to this advisory.
2025-03-13: CVE-2025-21683 was added to this advisory.
2025-03-13: CVE-2025-21636 was added to this advisory.
2025-03-13: CVE-2025-21666 was added to this advisory.
2025-03-13: CVE-2025-21678 was added to this advisory.
2025-03-13: CVE-2025-21690 was added to this advisory.
2025-03-13: CVE-2025-21638 was added to this advisory.
2025-03-13: CVE-2024-53685 was added to this advisory.
2025-03-13: CVE-2025-21639 was added to this advisory.
2025-03-13: CVE-2024-57882 was added to this advisory.
2025-03-13: CVE-2025-21692 was added to this advisory.
2025-03-13: CVE-2024-57917 was added to this advisory.
2025-03-13: CVE-2025-21664 was added to this advisory.
2025-03-13: CVE-2025-21669 was added to this advisory.