Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2025-094
Advisory Release Date: 2025-02-12 23:07 Pacific
Advisory Updated Date: 2025-03-13 01:32 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix possible UAF in ip6_finish_output2() (CVE-2024-44986)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (CVE-2024-47707)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix slab-use-after-free in ext4_split_extent_at() (CVE-2024-49884)
In the Linux kernel, the following vulnerability has been resolved:
net/xen-netback: prevent UAF in xenvif_flush_hash() (CVE-2024-49936)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix timer use-after-free on failed mount (CVE-2024-49960)
In the Linux kernel, the following vulnerability has been resolved:
driver core: bus: Fix double free in driver API bus_register() (CVE-2024-50055)
In the Linux kernel, the following vulnerability has been resolved:
uprobe: avoid out-of-bounds memory access of fetching args (CVE-2024-50067)
In the Linux kernel, the following vulnerability has been resolved:
net: fix data-races around sk->sk_forward_alloc (CVE-2024-53124)
In the Linux kernel, the following vulnerability has been resolved:
net: sched: fix ordering of qlen adjustment (CVE-2024-53164)
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: prevent use of deleted inode (CVE-2024-53690)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (CVE-2024-54031)
In the Linux kernel, the following vulnerability has been resolved:
Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (CVE-2024-55916)
In the Linux kernel, the following vulnerability has been resolved:
scsi: sg: Fix slab-use-after-free read in sg_release() (CVE-2024-56631)
In the Linux kernel, the following vulnerability has been resolved:
net: defer final 'struct net' free in netns dismantle (CVE-2024-56658)
In the Linux kernel, the following vulnerability has been resolved:
scsi: megaraid_sas: Fix for a potential deadlock (CVE-2024-57807)
In the Linux kernel, the following vulnerability has been resolved:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (CVE-2024-57884)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/uverbs: Prevent integer overflow issue (CVE-2024-57890)
In the Linux kernel, the following vulnerability has been resolved:
ila: serialize calls to nf_register_net_hooks() (CVE-2024-57900)
In the Linux kernel, the following vulnerability has been resolved:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (CVE-2024-57901)
In the Linux kernel, the following vulnerability has been resolved:
af_packet: fix vlan_get_tci() vs MSG_PEEK (CVE-2024-57902)
In the Linux kernel, the following vulnerability has been resolved:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end (CVE-2024-57929)
In the Linux kernel, the following vulnerability has been resolved:
selinux: ignore unknown extended permissions (CVE-2024-57931)
In the Linux kernel, the following vulnerability has been resolved:
net/sctp: Prevent autoclose integer overflow in sctp_association_init() (CVE-2024-57938)
In the Linux kernel, the following vulnerability has been resolved:
virtio-blk: don't keep queue frozen during system suspend (CVE-2024-57946)
In the Linux kernel, the following vulnerability has been resolved:
hrtimers: Handle CPU state correctly on hotplug (CVE-2024-57951)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: auth_enable: avoid using current->nsproxy (CVE-2025-21638)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: rto_min/max: avoid using current->nsproxy (CVE-2025-21639)
In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (CVE-2025-21640)
In the Linux kernel, the following vulnerability has been resolved:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (CVE-2025-21653)
In the Linux kernel, the following vulnerability has been resolved:
dm thin: make get_first_thin use rcu-safe list first function (CVE-2025-21664)
In the Linux kernel, the following vulnerability has been resolved:
gtp: Destroy device along with udp socket's netns dismantle. (CVE-2025-21678)
In the Linux kernel, the following vulnerability has been resolved:
vfio/platform: check the bounds of read/write syscalls (CVE-2025-21687)
In the Linux kernel, the following vulnerability has been resolved:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (CVE-2025-21689)
In the Linux kernel, the following vulnerability has been resolved:
fs/proc: fix softlockup in __read_vmcore (part 2) (CVE-2025-21694)
In the Linux kernel, the following vulnerability has been resolved:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (CVE-2025-21699)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
System reboot is required in order to complete this update.
aarch64:
kernel-5.4.290-205.397.amzn2.aarch64
kernel-headers-5.4.290-205.397.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.4.290-205.397.amzn2.aarch64
perf-5.4.290-205.397.amzn2.aarch64
perf-debuginfo-5.4.290-205.397.amzn2.aarch64
python-perf-5.4.290-205.397.amzn2.aarch64
python-perf-debuginfo-5.4.290-205.397.amzn2.aarch64
kernel-tools-5.4.290-205.397.amzn2.aarch64
kernel-tools-devel-5.4.290-205.397.amzn2.aarch64
kernel-tools-debuginfo-5.4.290-205.397.amzn2.aarch64
bpftool-5.4.290-205.397.amzn2.aarch64
bpftool-debuginfo-5.4.290-205.397.amzn2.aarch64
kernel-devel-5.4.290-205.397.amzn2.aarch64
kernel-debuginfo-5.4.290-205.397.amzn2.aarch64
i686:
kernel-headers-5.4.290-205.397.amzn2.i686
src:
kernel-5.4.290-205.397.amzn2.src
x86_64:
kernel-5.4.290-205.397.amzn2.x86_64
kernel-headers-5.4.290-205.397.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.4.290-205.397.amzn2.x86_64
perf-5.4.290-205.397.amzn2.x86_64
perf-debuginfo-5.4.290-205.397.amzn2.x86_64
python-perf-5.4.290-205.397.amzn2.x86_64
python-perf-debuginfo-5.4.290-205.397.amzn2.x86_64
kernel-tools-5.4.290-205.397.amzn2.x86_64
kernel-tools-devel-5.4.290-205.397.amzn2.x86_64
kernel-tools-debuginfo-5.4.290-205.397.amzn2.x86_64
bpftool-5.4.290-205.397.amzn2.x86_64
bpftool-debuginfo-5.4.290-205.397.amzn2.x86_64
kernel-devel-5.4.290-205.397.amzn2.x86_64
kernel-debuginfo-5.4.290-205.397.amzn2.x86_64
2025-03-13: CVE-2024-53690 was added to this advisory.
2025-03-13: CVE-2024-57807 was added to this advisory.
2025-03-13: CVE-2024-57902 was added to this advisory.
2025-03-13: CVE-2025-21689 was added to this advisory.
2025-03-13: CVE-2025-21694 was added to this advisory.
2025-03-13: CVE-2024-57929 was added to this advisory.
2025-03-13: CVE-2024-57946 was added to this advisory.
2025-03-13: CVE-2025-21699 was added to this advisory.
2025-03-13: CVE-2024-57901 was added to this advisory.
2025-03-13: CVE-2025-21640 was added to this advisory.
2025-03-13: CVE-2024-57951 was added to this advisory.
2025-03-13: CVE-2025-21687 was added to this advisory.
2025-03-13: CVE-2024-57931 was added to this advisory.
2025-03-13: CVE-2025-21678 was added to this advisory.
2025-03-13: CVE-2024-55916 was added to this advisory.
2025-03-13: CVE-2025-21638 was added to this advisory.
2025-03-13: CVE-2025-21639 was added to this advisory.
2025-03-13: CVE-2024-57938 was added to this advisory.
2025-03-13: CVE-2024-57884 was added to this advisory.
2025-03-13: CVE-2025-21664 was added to this advisory.
2025-03-13: CVE-2024-57890 was added to this advisory.
2025-03-13: CVE-2024-54031 was added to this advisory.