Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2025-084
Advisory Released Date: 2025-03-06
Advisory Updated Date: 2025-10-02
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Sanitise num_phys (CVE-2024-42159)
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (CVE-2024-42259)
In the Linux kernel, the following vulnerability has been resolved:
nvme-pci: add missing condition check for existence of mapped data (CVE-2024-42276)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix a segment issue when downgrading gso_size (CVE-2024-42281)
In the Linux kernel, the following vulnerability has been resolved:
net: nexthop: Initialize all fields in dumped nexthops (CVE-2024-42283)
In the Linux kernel, the following vulnerability has been resolved:
tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (CVE-2024-42285)
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: validate nvme_local_port correctly (CVE-2024-42286)
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Complete command early within lock (CVE-2024-42287)
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix for possible memory corruption (CVE-2024-42288)
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: During vport delete send async logout explicitly (CVE-2024-42289)
In the Linux kernel, the following vulnerability has been resolved:
kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: handle inconsistent state in nilfs_btnode_create_block() (CVE-2024-42295)
In the Linux kernel, the following vulnerability has been resolved:
PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (CVE-2024-42302)
In the Linux kernel, the following vulnerability has been resolved:
ext4: make sure the first directory block is not a hole (CVE-2024-42304)
In the Linux kernel, the following vulnerability has been resolved:
ext4: check dot and dotdot of dx_root before making dir indexed (CVE-2024-42305)
In the Linux kernel, the following vulnerability has been resolved:
udf: Avoid using corrupted block bitmap buffer (CVE-2024-42306)
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (CVE-2024-42311)
In the Linux kernel, the following vulnerability has been resolved:
sysctl: always initialize i_uid/i_gid (CVE-2024-42312)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix infinite loop when replaying fast_commit (CVE-2024-43828)
In the Linux kernel, the following vulnerability has been resolved:
leds: trigger: Unregister sysfs attributes before calling deactivate() (CVE-2024-43830)
In the Linux kernel, the following vulnerability has been resolved:
xdp: fix invalid wait context of page_pool_destroy() (CVE-2024-43834)
In the Linux kernel, the following vulnerability has been resolved:
lib: objagg: Fix general protection fault (CVE-2024-43846)
In the Linux kernel, the following vulnerability has been resolved:
dma: fix call order in dmam_free_coherent (CVE-2024-43856)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: qmi_wwan: fix memory leak for not ip packets (CVE-2024-43861)
In the Linux kernel, the following vulnerability has been resolved:
devres: Fix memory leakage caused by driver API devm_free_percpu() (CVE-2024-43871)
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880)
In the Linux kernel, the following vulnerability has been resolved:
exec: Fix ToCToU between perm check and set-uid/gid usage (CVE-2024-43882)
In the Linux kernel, the following vulnerability has been resolved:
usb: vhci-hcd: Do not drop references before new references are gained (CVE-2024-43883)
In the Linux kernel, the following vulnerability has been resolved:
padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889)
In the Linux kernel, the following vulnerability has been resolved:
serial: core: check uartclk for zero to avoid divide by zero (CVE-2024-43893)
In the Linux kernel, the following vulnerability has been resolved:
drm/client: fix null pointer dereference in drm_client_modeset_probe (CVE-2024-43894)
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: avoid BUG_ON() while continue reshape after reassembling (CVE-2024-43914)
In the Linux kernel, the following vulnerability has been resolved:
sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: ctnetlink: use helper function to calculate expect ID (CVE-2024-44944)
In the Linux kernel, the following vulnerability has been resolved:
x86/mtrr: Check if fixed MTRRs exist before saving them (CVE-2024-44948)
In the Linux kernel, the following vulnerability has been resolved:
x86/mm: Fix pti_clone_pgtable() alignment assumption (CVE-2024-44965)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2025-084 to update your system.
aarch64:
kernel-5.10.224-212.876.amzn2.aarch64
kernel-headers-5.10.224-212.876.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.224-212.876.amzn2.aarch64
perf-5.10.224-212.876.amzn2.aarch64
perf-debuginfo-5.10.224-212.876.amzn2.aarch64
python-perf-5.10.224-212.876.amzn2.aarch64
python-perf-debuginfo-5.10.224-212.876.amzn2.aarch64
kernel-tools-5.10.224-212.876.amzn2.aarch64
kernel-tools-devel-5.10.224-212.876.amzn2.aarch64
kernel-tools-debuginfo-5.10.224-212.876.amzn2.aarch64
bpftool-5.10.224-212.876.amzn2.aarch64
bpftool-debuginfo-5.10.224-212.876.amzn2.aarch64
kernel-devel-5.10.224-212.876.amzn2.aarch64
kernel-debuginfo-5.10.224-212.876.amzn2.aarch64
kernel-livepatch-5.10.224-212.876-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.224-212.876.amzn2.i686
src:
kernel-5.10.224-212.876.amzn2.src
x86_64:
kernel-5.10.224-212.876.amzn2.x86_64
kernel-headers-5.10.224-212.876.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.224-212.876.amzn2.x86_64
perf-5.10.224-212.876.amzn2.x86_64
perf-debuginfo-5.10.224-212.876.amzn2.x86_64
python-perf-5.10.224-212.876.amzn2.x86_64
python-perf-debuginfo-5.10.224-212.876.amzn2.x86_64
kernel-tools-5.10.224-212.876.amzn2.x86_64
kernel-tools-devel-5.10.224-212.876.amzn2.x86_64
kernel-tools-debuginfo-5.10.224-212.876.amzn2.x86_64
bpftool-5.10.224-212.876.amzn2.x86_64
bpftool-debuginfo-5.10.224-212.876.amzn2.x86_64
kernel-devel-5.10.224-212.876.amzn2.x86_64
kernel-debuginfo-5.10.224-212.876.amzn2.x86_64
kernel-livepatch-5.10.224-212.876-1.0-0.amzn2.x86_64
2025-10-02: CVE-2024-44965 was added to this advisory.
2025-10-02: CVE-2024-43894 was added to this advisory.
2025-10-02: CVE-2024-42306 was added to this advisory.
2025-10-02: CVE-2024-43889 was added to this advisory.
2025-10-02: CVE-2024-44935 was added to this advisory.
2025-10-02: CVE-2024-42304 was added to this advisory.
2025-10-02: CVE-2024-42295 was added to this advisory.
2025-10-02: CVE-2024-42289 was added to this advisory.
2025-10-02: CVE-2024-42311 was added to this advisory.
2025-10-02: CVE-2024-42276 was added to this advisory.
2025-10-02: CVE-2024-42281 was added to this advisory.
2025-10-02: CVE-2024-43846 was added to this advisory.
2025-10-02: CVE-2024-42312 was added to this advisory.
2025-10-02: CVE-2024-43856 was added to this advisory.
2025-10-02: CVE-2024-42286 was added to this advisory.
2025-10-02: CVE-2024-42292 was added to this advisory.
2025-10-02: CVE-2024-44948 was added to this advisory.
2025-10-02: CVE-2024-43828 was added to this advisory.
2025-10-02: CVE-2024-43830 was added to this advisory.
2025-10-02: CVE-2024-43914 was added to this advisory.
2025-10-02: CVE-2024-42288 was added to this advisory.
2025-10-02: CVE-2024-43834 was added to this advisory.
2025-10-02: CVE-2024-43893 was added to this advisory.
2025-10-02: CVE-2024-42283 was added to this advisory.
2025-09-08: CVE-2024-43861 was added to this advisory.
2025-07-29: CVE-2024-43883 was added to this advisory.
2025-07-16: CVE-2024-42305 was added to this advisory.