Amazon Linux 2023 Security Advisory: ALAS2023LIVEPATCH-2025-089
Advisory Released Date: 2025-09-29
Advisory Updated Date: 2025-09-29
FAQs regarding Amazon Linux ALAS/CVE Severity
In the Linux kernel, the following vulnerability has been resolved:
bridge: mcast: Fix use-after-free during router port configuration (CVE-2025-38248)
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Refuse to evaluate a method if arguments are missing (CVE-2025-38386)
In the Linux kernel, the following vulnerability has been resolved:
ppp: fix race conditions in ppp_fill_forward_path (CVE-2025-39673)
In the Linux kernel, the following vulnerability has been resolved:
net/sched: Fix backlog accounting in qdisc_dequeue_internal (CVE-2025-39677)
In the Linux kernel, the following vulnerability has been resolved:
fs/buffer: fix use-after-free when call bh_read() helper (CVE-2025-39691)
In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
Affected Packages:
kernel-livepatch-6.1.141-165.249
Issue Correction:
Please ensure you have live patching enabled. Run dnf update kernel-livepatch-6.1.141-165.249 --releasever latest or dnf update --advisory ALAS2023LIVEPATCH-2025-089 --releasever latest to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
kernel-livepatch-6.1.141-165.249-1.0-3.amzn2023.aarch64
src:
kernel-livepatch-6.1.141-165.249-1.0-3.amzn2023.src
x86_64:
kernel-livepatch-6.1.141-165.249-1.0-3.amzn2023.x86_64