ALAS2KERNEL-5.10-2025-094


Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2025-094
Advisory Released Date: 2025-06-09
Advisory Updated Date: 2025-09-23
Severity: Important

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Cleanup partial engine discovery failures (CVE-2022-48893)

In the Linux kernel, the following vulnerability has been resolved:

ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (CVE-2022-49063)

In the Linux kernel, the following vulnerability has been resolved:

kernel/resource: fix kfree() of bootmem memory again (CVE-2022-49190)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: fix memory leak during D3hot to D0 transition (CVE-2022-49219)

In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix UAF in cifs_demultiplex_thread() (CVE-2023-52572)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (CVE-2023-52752)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential deadlock when releasing mids (CVE-2023-52757)

A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. (CVE-2024-24855)

In the Linux kernel, the following vulnerability has been resolved:

fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats (CVE-2024-26686)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_debug_files_proc_show() (CVE-2024-26928)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867)

In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: do not WARN if iocg was already offlined (CVE-2024-36908)

In the Linux kernel, the following vulnerability has been resolved:

nvme: avoid double free special payload (CVE-2024-41073)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in async decryption (CVE-2024-50047)

In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154)

In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix flushing uninitialized delayed_work on cache_ctr error (CVE-2024-50280)

In the Linux kernel, the following vulnerability has been resolved:

bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)

In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)

In the Linux kernel, the following vulnerability has been resolved:

media: streamzap: fix race between device disconnection and urb callback (CVE-2025-22027)

In the Linux kernel, the following vulnerability has been resolved:

sctp: detect and prevent references to a freed transport in sendmsg (CVE-2025-23142)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer in can_accept_new_subflow (CVE-2025-23145)

In the Linux kernel, the following vulnerability has been resolved:

i3c: Add NULL pointer check in i3c_master_queue_ibi() (CVE-2025-23147)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off-by-one error in do_split (CVE-2025-23150)

In the Linux kernel, the following vulnerability has been resolved:

net: vlan: don't propagate flags on open (CVE-2025-23163)

In the Linux kernel, the following vulnerability has been resolved:

ext4: ignore xattrs past end (CVE-2025-37738)

In the Linux kernel, the following vulnerability has been resolved:

net: tls: explicitly disallow disconnect (CVE-2025-37756)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix memory leak in tipc_link_xmit (CVE-2025-37757)

In the Linux kernel, the following vulnerability has been resolved:

virtiofs: add filesystem context source name check (CVE-2025-37773)

In the Linux kernel, the following vulnerability has been resolved:

isofs: Prevent the use of too small fid (CVE-2025-37780)

In the Linux kernel, the following vulnerability has been resolved:

cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (CVE-2025-37788)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix nested key length validation in the set() action (CVE-2025-37789)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)

In the Linux kernel, the following vulnerability has been resolved:

crypto: null - Use spin lock instead of mutex (CVE-2025-37808)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (CVE-2025-37824)

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix reference leak in pci_register_host_bridge() (CVE-2025-37836)

In the Linux kernel, the following vulnerability has been resolved:

jbd2: remove wrong sb->s_sequence check (CVE-2025-37839)

In the Linux kernel, the following vulnerability has been resolved:

cifs: avoid NULL pointer dereference in dbg call (CVE-2025-37844)

In the Linux kernel, the following vulnerability has been resolved:

scsi: st: Fix array overflow in st_setup() (CVE-2025-37857)

In the Linux kernel, the following vulnerability has been resolved:

page_pool: avoid infinite loop to schedule delayed worker (CVE-2025-37859)

In the Linux kernel, the following vulnerability has been resolved:

HID: pidff: Fix null pointer dereference in pidff_find_fields (CVE-2025-37862)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Silence oversized kvmalloc() warning (CVE-2025-37867)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: decrease sc_count directly if fail to queue dl_recall (CVE-2025-37871)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Reset IRTE to host control if *new* route isn't postable (CVE-2025-37885)

In the Linux kernel, the following vulnerability has been resolved:

mtd: inftlcore: Add error check for inftl_read_oob() (CVE-2025-37892)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Add cond_resched() to ftrace_graph_set_hash() (CVE-2025-37940)

In the Linux kernel, the following vulnerability has been resolved:

net: phy: leds: fix memory leak (CVE-2025-37989)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2025-094 to update your system.
System reboot is required in order to complete this update.

New Packages:
aarch64:
    kernel-5.10.237-230.949.amzn2.aarch64
    kernel-headers-5.10.237-230.949.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.10.237-230.949.amzn2.aarch64
    perf-5.10.237-230.949.amzn2.aarch64
    perf-debuginfo-5.10.237-230.949.amzn2.aarch64
    python-perf-5.10.237-230.949.amzn2.aarch64
    python-perf-debuginfo-5.10.237-230.949.amzn2.aarch64
    kernel-tools-5.10.237-230.949.amzn2.aarch64
    kernel-tools-devel-5.10.237-230.949.amzn2.aarch64
    kernel-tools-debuginfo-5.10.237-230.949.amzn2.aarch64
    bpftool-5.10.237-230.949.amzn2.aarch64
    bpftool-debuginfo-5.10.237-230.949.amzn2.aarch64
    kernel-devel-5.10.237-230.949.amzn2.aarch64
    kernel-debuginfo-5.10.237-230.949.amzn2.aarch64
    kernel-livepatch-5.10.237-230.949-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.10.237-230.949.amzn2.i686

src:
    kernel-5.10.237-230.949.amzn2.src

x86_64:
    kernel-5.10.237-230.949.amzn2.x86_64
    kernel-headers-5.10.237-230.949.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.10.237-230.949.amzn2.x86_64
    perf-5.10.237-230.949.amzn2.x86_64
    perf-debuginfo-5.10.237-230.949.amzn2.x86_64
    python-perf-5.10.237-230.949.amzn2.x86_64
    python-perf-debuginfo-5.10.237-230.949.amzn2.x86_64
    kernel-tools-5.10.237-230.949.amzn2.x86_64
    kernel-tools-devel-5.10.237-230.949.amzn2.x86_64
    kernel-tools-debuginfo-5.10.237-230.949.amzn2.x86_64
    bpftool-5.10.237-230.949.amzn2.x86_64
    bpftool-debuginfo-5.10.237-230.949.amzn2.x86_64
    kernel-devel-5.10.237-230.949.amzn2.x86_64
    kernel-debuginfo-5.10.237-230.949.amzn2.x86_64
    kernel-livepatch-5.10.237-230.949-1.0-0.amzn2.x86_64

Changelog:

2025-09-23: CVE-2025-23142 was added to this advisory.

2025-09-23: CVE-2025-37857 was added to this advisory.

2025-09-23: CVE-2022-49219 was added to this advisory.

2025-09-23: CVE-2024-50280 was added to this advisory.

2025-09-23: CVE-2025-37797 was added to this advisory.

2025-09-23: CVE-2025-37836 was added to this advisory.

2025-09-23: CVE-2025-37808 was added to this advisory.

2025-09-23: CVE-2025-37757 was added to this advisory.

2025-09-23: CVE-2025-37892 was added to this advisory.

2025-09-23: CVE-2025-23163 was added to this advisory.

2025-09-23: CVE-2025-22027 was added to this advisory.

2025-09-23: CVE-2025-23147 was added to this advisory.

2025-09-23: CVE-2025-37823 was added to this advisory.

2025-09-23: CVE-2024-35867 was added to this advisory.

2025-09-23: CVE-2025-37989 was added to this advisory.

2025-09-23: CVE-2023-52752 was added to this advisory.

2025-09-23: CVE-2024-26686 was added to this advisory.

2025-09-23: CVE-2025-37788 was added to this advisory.

2025-09-23: CVE-2025-37867 was added to this advisory.

2025-09-23: CVE-2025-37824 was added to this advisory.

2025-09-23: CVE-2025-37862 was added to this advisory.

2025-09-23: CVE-2025-37871 was added to this advisory.

2025-09-23: CVE-2023-52572 was added to this advisory.

2025-09-23: CVE-2025-37789 was added to this advisory.

2025-09-23: CVE-2024-26928 was added to this advisory.

2025-09-23: CVE-2025-37844 was added to this advisory.

2025-09-23: CVE-2024-41073 was added to this advisory.

2025-09-23: CVE-2023-52757 was added to this advisory.

2025-09-23: CVE-2025-23145 was added to this advisory.

2025-09-23: CVE-2025-21853 was added to this advisory.

2025-09-23: CVE-2024-36908 was added to this advisory.

2025-09-23: CVE-2022-48893 was added to this advisory.

2025-09-23: CVE-2025-37738 was added to this advisory.

2025-09-23: CVE-2023-52621 was added to this advisory.

2025-09-23: CVE-2025-37885 was added to this advisory.

2025-09-23: CVE-2025-37773 was added to this advisory.

2025-09-23: CVE-2025-37780 was added to this advisory.

2025-09-23: CVE-2025-37859 was added to this advisory.

2025-09-23: CVE-2022-49190 was added to this advisory.

2025-09-23: CVE-2024-50047 was added to this advisory.

2025-09-23: CVE-2024-24855 was added to this advisory.

2025-09-23: CVE-2025-37756 was added to this advisory.

2025-09-23: CVE-2025-37839 was added to this advisory.

2025-07-29: CVE-2025-23150 was added to this advisory.

2025-07-29: CVE-2024-50154 was added to this advisory.

2025-07-29: CVE-2025-37940 was added to this advisory.