Amazon Linux 2 : kernel (ALASKERNEL-5.15-2025-069)

high Nessus Plugin ID 233694

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.15.179-121.185. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.15-2025-069 advisory.

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (CVE-2024-46830)

In the Linux kernel, the following vulnerability has been resolved:

memcg: fix soft lockup in the OOM process (CVE-2024-57977)

In the Linux kernel, the following vulnerability has been resolved:

pps: Fix a use-after-free (CVE-2024-57979)

In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986)

In the Linux kernel, the following vulnerability has been resolved:

tpm: Change to kvalloc() in eventlog/acpi.c (CVE-2024-58005)

In the Linux kernel, the following vulnerability has been resolved:

safesetid: check size of policy writes (CVE-2024-58016)

In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: Add NULL check in mt_input_configured (CVE-2024-58020)

In the Linux kernel, the following vulnerability has been resolved:

team: prevent adding a device which is already a team device lower (CVE-2024-58071)

In the Linux kernel, the following vulnerability has been resolved:

KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (CVE-2024-58083)

In the Linux kernel, the following vulnerability has been resolved:

sched/core: Prevent rescheduling when interrupts are disabled (CVE-2024-58090)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: Disallow replacing of child qdisc from one parent to another (CVE-2025-21700)

In the Linux kernel, the following vulnerability has been resolved:

net: avoid race between device unregistration and ethnl ops (CVE-2025-21701)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: consolidate suboption status (CVE-2025-21707)

In the Linux kernel, the following vulnerability has been resolved:

ipmr: do not call mr_mfc_uses_dev() for unres entries (CVE-2025-21719)

In the Linux kernel, the following vulnerability has been resolved:

padata: avoid UAF for reorder_work (CVE-2025-21726)

In the Linux kernel, the following vulnerability has been resolved:

padata: fix UAF in padata_reorder (CVE-2025-21727)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Send signals asynchronously if !preemptible (CVE-2025-21728)

In the Linux kernel, the following vulnerability has been resolved:

nbd: don't allow reconnect after disconnect (CVE-2025-21731)

In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix class @block_class's subsystem refcount leakage (CVE-2025-21745)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free when attempting to join an aborted transaction (CVE-2025-21753)

In the Linux kernel, the following vulnerability has been resolved:

vsock: Keep the binding until socket destruction (CVE-2025-21756)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: add RCU protection to mld_newpack() (CVE-2025-21758)

In the Linux kernel, the following vulnerability has been resolved:

ndisc: extend RCU protection in ndisc_send_skb() (CVE-2025-21760)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (CVE-2025-21761)

In the Linux kernel, the following vulnerability has been resolved:

arp: use RCU protection in arp_xmit() (CVE-2025-21762)

In the Linux kernel, the following vulnerability has been resolved:

neighbour: use RCU protection in __neigh_notify() (CVE-2025-21763)

In the Linux kernel, the following vulnerability has been resolved:

ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)

In the Linux kernel, the following vulnerability has been resolved:

ipv4: use RCU protection in __ip_rt_update_pmtu() (CVE-2025-21766)

In the Linux kernel, the following vulnerability has been resolved:

clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (CVE-2025-21767)

In the Linux kernel, the following vulnerability has been resolved:

USB: hub: Ignore non-compliant devices with too many configs or interfaces (CVE-2025-21776)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (CVE-2025-21779)

In the Linux kernel, the following vulnerability has been resolved:

arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785)

In the Linux kernel, the following vulnerability has been resolved:

team: better TEAM_OPTION_TYPE_STRING validation (CVE-2025-21787)

In the Linux kernel, the following vulnerability has been resolved:

vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)

In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796)

In the Linux kernel, the following vulnerability has been resolved:

net: let net.core.dev_weight always be non-zero (CVE-2025-21806)

In the Linux kernel, the following vulnerability has been resolved:

ptp: Ensure info->enable callback is always set (CVE-2025-21814)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject mismatching sum of field_len with set key length (CVE-2025-21826)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: Add check for next_buffer in receive_encrypted_standard() (CVE-2025-21844)

In the Linux kernel, the following vulnerability has been resolved:

acct: perform last write from workqueue (CVE-2025-21846)

In the Linux kernel, the following vulnerability has been resolved:

geneve: Fix use-after-free in geneve_find_dev(). (CVE-2025-21858)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: always handle address removal under msk socket lock (CVE-2025-21875)

In the Linux kernel, the following vulnerability has been resolved:

ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)

In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)

In the Linux kernel, the following vulnerability has been resolved:

vlan: enforce underlying device type (CVE-2025-21920)

In the Linux kernel, the following vulnerability has been resolved:

net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)

In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46830.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26982.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57979.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21700.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21701.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21726.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21727.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21731.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21753.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21756.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21758.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21760.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21761.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21762.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21763.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21764.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21791.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21796.html

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-069.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58083.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21785.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21858.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21887.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21926.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57977.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21719.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21728.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21767.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21787.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21795.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21919.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21920.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21928.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21779.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57981.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57986.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58005.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58020.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58071.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58090.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21745.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21776.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21806.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21814.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21826.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21844.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21846.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21875.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58016.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21707.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21766.html

Plugin Details

Severity: High

ID: 233694

File Name: al2_ALASKERNEL-5_15-2025-069.nasl

Version: 1.5

Type: local

Agent: unix

Published: 4/1/2025

Updated: 5/22/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-21928

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.179-121.185

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: No known exploits are available

Patch Publication Date: 3/26/2025

Vulnerability Publication Date: 4/27/2024

Reference Information

CVE: CVE-2024-26982, CVE-2024-46830, CVE-2024-57977, CVE-2024-57979, CVE-2024-57981, CVE-2024-57986, CVE-2024-58005, CVE-2024-58016, CVE-2024-58020, CVE-2024-58071, CVE-2024-58083, CVE-2024-58090, CVE-2025-21700, CVE-2025-21701, CVE-2025-21707, CVE-2025-21719, CVE-2025-21726, CVE-2025-21727, CVE-2025-21728, CVE-2025-21731, CVE-2025-21745, CVE-2025-21753, CVE-2025-21756, CVE-2025-21758, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21766, CVE-2025-21767, CVE-2025-21776, CVE-2025-21779, CVE-2025-21785, CVE-2025-21787, CVE-2025-21791, CVE-2025-21795, CVE-2025-21796, CVE-2025-21806, CVE-2025-21814, CVE-2025-21826, CVE-2025-21844, CVE-2025-21846, CVE-2025-21858, CVE-2025-21875, CVE-2025-21887, CVE-2025-21919, CVE-2025-21920, CVE-2025-21926, CVE-2025-21928