ALASKERNEL-5.4-2025-094


Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2025-094
Advisory Release Date: 2025-02-12 23:07 Pacific
Advisory Updated Date: 2025-02-25 09:10 Pacific
Severity: Important

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible UAF in ip6_finish_output2() (CVE-2024-44986)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (CVE-2024-47707)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at() (CVE-2024-49884)

In the Linux kernel, the following vulnerability has been resolved:

net/xen-netback: prevent UAF in xenvif_flush_hash() (CVE-2024-49936)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix timer use-after-free on failed mount (CVE-2024-49960)

In the Linux kernel, the following vulnerability has been resolved:

driver core: bus: Fix double free in driver API bus_register() (CVE-2024-50055)

In the Linux kernel, the following vulnerability has been resolved:

uprobe: avoid out-of-bounds memory access of fetching args (CVE-2024-50067)

In the Linux kernel, the following vulnerability has been resolved:

net: fix data-races around sk->sk_forward_alloc (CVE-2024-53124)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment (CVE-2024-53164)

In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Fix slab-use-after-free read in sg_release() (CVE-2024-56631)

In the Linux kernel, the following vulnerability has been resolved:

net: defer final 'struct net' free in netns dismantle (CVE-2024-56658)

In the Linux kernel, the following vulnerability has been resolved:

ila: serialize calls to nf_register_net_hooks() (CVE-2024-57900)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (CVE-2025-21653)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.
System reboot is required in order to complete this update.

New Packages:
aarch64:
    kernel-5.4.290-205.397.amzn2.aarch64
    kernel-headers-5.4.290-205.397.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.4.290-205.397.amzn2.aarch64
    perf-5.4.290-205.397.amzn2.aarch64
    perf-debuginfo-5.4.290-205.397.amzn2.aarch64
    python-perf-5.4.290-205.397.amzn2.aarch64
    python-perf-debuginfo-5.4.290-205.397.amzn2.aarch64
    kernel-tools-5.4.290-205.397.amzn2.aarch64
    kernel-tools-devel-5.4.290-205.397.amzn2.aarch64
    kernel-tools-debuginfo-5.4.290-205.397.amzn2.aarch64
    bpftool-5.4.290-205.397.amzn2.aarch64
    bpftool-debuginfo-5.4.290-205.397.amzn2.aarch64
    kernel-devel-5.4.290-205.397.amzn2.aarch64
    kernel-debuginfo-5.4.290-205.397.amzn2.aarch64

i686:
    kernel-headers-5.4.290-205.397.amzn2.i686

src:
    kernel-5.4.290-205.397.amzn2.src

x86_64:
    kernel-5.4.290-205.397.amzn2.x86_64
    kernel-headers-5.4.290-205.397.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.4.290-205.397.amzn2.x86_64
    perf-5.4.290-205.397.amzn2.x86_64
    perf-debuginfo-5.4.290-205.397.amzn2.x86_64
    python-perf-5.4.290-205.397.amzn2.x86_64
    python-perf-debuginfo-5.4.290-205.397.amzn2.x86_64
    kernel-tools-5.4.290-205.397.amzn2.x86_64
    kernel-tools-devel-5.4.290-205.397.amzn2.x86_64
    kernel-tools-debuginfo-5.4.290-205.397.amzn2.x86_64
    bpftool-5.4.290-205.397.amzn2.x86_64
    bpftool-debuginfo-5.4.290-205.397.amzn2.x86_64
    kernel-devel-5.4.290-205.397.amzn2.x86_64
    kernel-debuginfo-5.4.290-205.397.amzn2.x86_64