ALAS2KERNEL-5.10-2025-104


Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2025-104
Advisory Released Date: 2025-09-16
Advisory Updated Date: 2025-10-02
Severity: Important

Issue Overview:

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock when cloning inline extents and using qgroups (CVE-2021-46987)

In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix another memory leak in error handling paths (CVE-2021-47070)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Return CQE error if invalid lkey was supplied (CVE-2021-47076)

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix link down processing to address NULL pointer dereference (CVE-2021-47183)

In the Linux kernel, the following vulnerability has been resolved:

block: don't call rq_qos_ops->done_bio if the bio isn't tracked (CVE-2021-47412)

In the Linux kernel, the following vulnerability has been resolved:

ptp: Fix possible memory leak in ptp_clock_register() (CVE-2021-47455)

In the Linux kernel, the following vulnerability has been resolved:

dm rq: don't queue request to blk-mq during DM suspend (CVE-2021-47498)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (CVE-2022-50327)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)

In the Linux kernel, the following vulnerability has been resolved:

virtio-net: ensure the received length does not exceed allocated size (CVE-2025-38375)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (CVE-2025-38468)

In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (CVE-2025-38470)

In the Linux kernel, the following vulnerability has been resolved:

usb: net: sierra: check for no status endpoint (CVE-2025-38474)

In the Linux kernel, the following vulnerability has been resolved:

rpl: Fix use-after-free in rpl_do_srh_inline(). (CVE-2025-38476)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate (CVE-2025-38477)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in crypt_message when using async crypto (CVE-2025-38488)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hid_hw_raw_request (CVE-2025-38494)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: ensure the allocated report buffer can contain the reserved report ID (CVE-2025-38495)

In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Add down_write(trace_event_sem) when adding trace event (CVE-2025-38539)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree (CVE-2025-38553)

In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings (CVE-2025-38563)

In the Linux kernel, the following vulnerability has been resolved:

perf/core: Exit early on perf_mmap() fail (CVE-2025-38565)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment() (CVE-2025-38572)

In the Linux kernel, the following vulnerability has been resolved:

pptp: ensure minimal skb length in pptp_xmit() (CVE-2025-38574)

In the Linux kernel, the following vulnerability has been resolved:

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (CVE-2025-38608)

In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier() (CVE-2025-38617)

In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY (CVE-2025-38618)

In the Linux kernel, the following vulnerability has been resolved:

net: drop UFO packets in udp_rcv_segment() (CVE-2025-38622)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_nfacct: don't assume acct name is null-terminated (CVE-2025-38639)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: remove mutex_lock check in hfsplus_free_extents (CVE-2025-38650)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: reject invalid file types when reading inodes (CVE-2025-38663)

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix NULL dereference on unbind due to stale coupling data (CVE-2025-38668)

In the Linux kernel, the following vulnerability has been resolved:

i2c: qup: jump out of the loop in case of timeout (CVE-2025-38671)

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Avoid stack buffer overflow from kernel cmdline (CVE-2025-38676)

In the Linux kernel, the following vulnerability has been resolved:

mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (CVE-2025-38681)

In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix panic during namespace deletion with VF (CVE-2025-38683)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes (CVE-2025-38684)

In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix uninited ptr deref in block/scsi layout (CVE-2025-38691)

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure (CVE-2025-38695)

In the Linux kernel, the following vulnerability has been resolved:

scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (CVE-2025-38700)

In the Linux kernel, the following vulnerability has been resolved:

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (CVE-2025-38701)

In the Linux kernel, the following vulnerability has been resolved:

drbd: add missing kref_get in handle_write_conflicts (CVE-2025-38708)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() (CVE-2025-38712)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (CVE-2025-38713)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (CVE-2025-38714)

In the Linux kernel, the following vulnerability has been resolved:

hfs: fix slab-out-of-bounds in hfs_bnode_read() (CVE-2025-38715)

In the Linux kernel, the following vulnerability has been resolved:

sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump (CVE-2025-38721)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject: don't leak dst refcount for loopback packets (CVE-2025-38732)

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla4xxx: Prevent a potential error pointer dereference (CVE-2025-39676)

In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (CVE-2025-39681)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Limit access to parser->buffer when trace_get_user failed (CVE-2025-39683)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Also allocate and copy hash for reading of filter files (CVE-2025-39689)

In the Linux kernel, the following vulnerability has been resolved:

fs/buffer: fix use-after-free when call bh_read() helper (CVE-2025-39691)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a race when updating an existing write (CVE-2025-39697)

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: fix panic due to PSLVERR (CVE-2025-39724)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)

In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock (CVE-2025-39736)

In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect ->defer_qs_iw_pending from data race (CVE-2025-39749)

In the Linux kernel, the following vulnerability has been resolved:

fs: Prevent file descriptor table allocations exceeding INT_MAX (CVE-2025-39756)

In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing (CVE-2025-39760)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (CVE-2025-39766)

In the Linux kernel, the following vulnerability has been resolved:

jbd2: prevent softlockup in jbd2_log_do_checkpoint() (CVE-2025-39782)

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix configfs group list head handling (CVE-2025-39783)

In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (CVE-2025-39788)

In the Linux kernel, the following vulnerability has been resolved:

block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (CVE-2025-39795)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix the setting of capabilities when automounting a new filesystem (CVE-2025-39798)

In the Linux kernel, the following vulnerability has been resolved:

HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (CVE-2025-39808)

In the Linux kernel, the following vulnerability has been resolved:

sctp: initialize more fields in sctp_v6_from_sk() (CVE-2025-39812)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (CVE-2025-39813)

In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest (CVE-2025-39823)

In the Linux kernel, the following vulnerability has been resolved:

HID: asus: fix UAF via HID_CLAIMED_INPUT validation (CVE-2025-39824)

In the Linux kernel, the following vulnerability has been resolved:

xfs: do not propagate ENODATA disk errors into xattr code (CVE-2025-39835)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.10-2025-104 to update your system.
System reboot is required in order to complete this update.

New Packages:
aarch64:
    kernel-5.10.242-239.961.amzn2.aarch64
    kernel-headers-5.10.242-239.961.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.10.242-239.961.amzn2.aarch64
    perf-5.10.242-239.961.amzn2.aarch64
    perf-debuginfo-5.10.242-239.961.amzn2.aarch64
    python-perf-5.10.242-239.961.amzn2.aarch64
    python-perf-debuginfo-5.10.242-239.961.amzn2.aarch64
    kernel-tools-5.10.242-239.961.amzn2.aarch64
    kernel-tools-devel-5.10.242-239.961.amzn2.aarch64
    kernel-tools-debuginfo-5.10.242-239.961.amzn2.aarch64
    bpftool-5.10.242-239.961.amzn2.aarch64
    bpftool-debuginfo-5.10.242-239.961.amzn2.aarch64
    kernel-devel-5.10.242-239.961.amzn2.aarch64
    kernel-debuginfo-5.10.242-239.961.amzn2.aarch64
    kernel-livepatch-5.10.242-239.961-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.10.242-239.961.amzn2.i686

src:
    kernel-5.10.242-239.961.amzn2.src

x86_64:
    kernel-5.10.242-239.961.amzn2.x86_64
    kernel-headers-5.10.242-239.961.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.10.242-239.961.amzn2.x86_64
    perf-5.10.242-239.961.amzn2.x86_64
    perf-debuginfo-5.10.242-239.961.amzn2.x86_64
    python-perf-5.10.242-239.961.amzn2.x86_64
    python-perf-debuginfo-5.10.242-239.961.amzn2.x86_64
    kernel-tools-5.10.242-239.961.amzn2.x86_64
    kernel-tools-devel-5.10.242-239.961.amzn2.x86_64
    kernel-tools-debuginfo-5.10.242-239.961.amzn2.x86_64
    bpftool-5.10.242-239.961.amzn2.x86_64
    bpftool-debuginfo-5.10.242-239.961.amzn2.x86_64
    kernel-devel-5.10.242-239.961.amzn2.x86_64
    kernel-debuginfo-5.10.242-239.961.amzn2.x86_64
    kernel-livepatch-5.10.242-239.961-1.0-0.amzn2.x86_64

Changelog:

2025-10-02: CVE-2025-38691 was added to this advisory.

2025-10-02: CVE-2025-39788 was added to this advisory.

2025-10-02: CVE-2025-39782 was added to this advisory.

2025-10-02: CVE-2025-38721 was added to this advisory.

2025-10-02: CVE-2025-38574 was added to this advisory.

2025-10-02: CVE-2025-39736 was added to this advisory.

2025-10-02: CVE-2025-39798 was added to this advisory.

2025-10-02: CVE-2025-39808 was added to this advisory.

2025-10-02: CVE-2025-39835 was added to this advisory.

2025-10-02: CVE-2025-38715 was added to this advisory.

2025-10-02: CVE-2025-38468 was added to this advisory.

2025-10-02: CVE-2025-39676 was added to this advisory.

2025-10-02: CVE-2025-38608 was added to this advisory.

2025-10-02: CVE-2025-38676 was added to this advisory.

2025-10-02: CVE-2025-39681 was added to this advisory.

2025-10-02: CVE-2025-39783 was added to this advisory.

2025-10-02: CVE-2025-39795 was added to this advisory.

2025-10-02: CVE-2025-38712 was added to this advisory.

2025-10-02: CVE-2025-38563 was added to this advisory.

2025-10-02: CVE-2025-39749 was added to this advisory.

2025-10-02: CVE-2025-38539 was added to this advisory.

2025-10-02: CVE-2025-39812 was added to this advisory.

2025-10-02: CVE-2025-38681 was added to this advisory.

2025-10-02: CVE-2025-39756 was added to this advisory.

2025-10-02: CVE-2025-38671 was added to this advisory.

2025-10-02: CVE-2025-39760 was added to this advisory.

2025-10-02: CVE-2025-38476 was added to this advisory.

2025-10-02: CVE-2025-38639 was added to this advisory.

2025-10-02: CVE-2025-38663 was added to this advisory.

2025-10-02: CVE-2025-39813 was added to this advisory.

2025-10-02: CVE-2025-38565 was added to this advisory.

2025-10-02: CVE-2025-38708 was added to this advisory.

2025-10-02: CVE-2025-39724 was added to this advisory.

2025-10-02: CVE-2025-38470 was added to this advisory.

2025-09-22: CVE-2025-39691 was added to this advisory.

2025-09-22: CVE-2025-39689 was added to this advisory.

2025-09-22: CVE-2025-38684 was added to this advisory.

2025-09-22: CVE-2025-38695 was added to this advisory.

2025-09-22: CVE-2025-39766 was added to this advisory.

2025-09-22: CVE-2025-38700 was added to this advisory.

2025-09-22: CVE-2025-39683 was added to this advisory.

2025-09-22: CVE-2025-38701 was added to this advisory.

2025-09-22: CVE-2025-38713 was added to this advisory.

2025-09-22: CVE-2025-38714 was added to this advisory.

2025-09-22: CVE-2025-38732 was added to this advisory.

2025-09-22: CVE-2025-39823 was added to this advisory.

2025-09-22: CVE-2025-38724 was added to this advisory.

2025-09-22: CVE-2025-39697 was added to this advisory.

2025-09-22: CVE-2025-39824 was added to this advisory.

2025-09-22: CVE-2025-38718 was added to this advisory.

2025-09-22: CVE-2025-39730 was added to this advisory.

2025-09-22: CVE-2025-38683 was added to this advisory.

2025-09-22: CVE-2025-39817 was added to this advisory.

2025-09-22: CVE-2022-50327 was added to this advisory.