Amazon Linux 2 : kernel (ALASKERNEL-5.4-2025-097)

high Nessus Plugin ID 233712

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.4.291-206.400. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.4-2025-097 advisory.

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870)

In the Linux kernel, the following vulnerability has been resolved:

rdma/cxgb4: Prevent potential integer overflow on 32bit (CVE-2024-57973)

In the Linux kernel, the following vulnerability has been resolved:

memcg: fix soft lockup in the OOM process (CVE-2024-57977)

In the Linux kernel, the following vulnerability has been resolved:

pps: Fix a use-after-free (CVE-2024-57979)

In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986)

In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: Add NULL check in mt_input_configured (CVE-2024-58020)

In the Linux kernel, the following vulnerability has been resolved:

rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (CVE-2024-58069)

In the Linux kernel, the following vulnerability has been resolved:

team: prevent adding a device which is already a team device lower (CVE-2024-58071)

In the Linux kernel, the following vulnerability has been resolved:

KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (CVE-2024-58083)

In the Linux kernel, the following vulnerability has been resolved:

sched/core: Prevent rescheduling when interrupts are disabled (CVE-2024-58090)

In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: add bounds checks to host bulk flow fairness counts (CVE-2025-21647)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: Disallow replacing of child qdisc from one parent to another (CVE-2025-21700)

In the Linux kernel, the following vulnerability has been resolved:

pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (CVE-2025-21702)

In the Linux kernel, the following vulnerability has been resolved:

net: usb: rtl8150: enable basic endpoint checking (CVE-2025-21708)

In the Linux kernel, the following vulnerability has been resolved:

ipmr: do not call mr_mfc_uses_dev() for unres entries (CVE-2025-21719)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: handle errors that nilfs_prepare_chunk() may return (CVE-2025-21721)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: do not force clear folio if buffer is referenced (CVE-2025-21722)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Send signals asynchronously if !preemptible (CVE-2025-21728)

In the Linux kernel, the following vulnerability has been resolved:

nbd: don't allow reconnect after disconnect (CVE-2025-21731)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free when attempting to join an aborted transaction (CVE-2025-21753)

In the Linux kernel, the following vulnerability has been resolved:

ndisc: extend RCU protection in ndisc_send_skb() (CVE-2025-21760)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (CVE-2025-21761)

In the Linux kernel, the following vulnerability has been resolved:

arp: use RCU protection in arp_xmit() (CVE-2025-21762)

In the Linux kernel, the following vulnerability has been resolved:

neighbour: use RCU protection in __neigh_notify() (CVE-2025-21763)

In the Linux kernel, the following vulnerability has been resolved:

ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)

In the Linux kernel, the following vulnerability has been resolved:

partitions: mac: fix handling of bogus partition table (CVE-2025-21772)

In the Linux kernel, the following vulnerability has been resolved:

USB: hub: Ignore non-compliant devices with too many configs or interfaces (CVE-2025-21776)

In the Linux kernel, the following vulnerability has been resolved:

arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785)

In the Linux kernel, the following vulnerability has been resolved:

team: better TEAM_OPTION_TYPE_STRING validation (CVE-2025-21787)

In the Linux kernel, the following vulnerability has been resolved:

vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)

In the Linux kernel, the following vulnerability has been resolved:

net: let net.core.dev_weight always be non-zero (CVE-2025-21806)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: protect access to buffers with no active references (CVE-2025-21811)

In the Linux kernel, the following vulnerability has been resolved:

ptp: Ensure info->enable callback is always set (CVE-2025-21814)

In the Linux kernel, the following vulnerability has been resolved:

acct: perform last write from workqueue (CVE-2025-21846)

In the Linux kernel, the following vulnerability has been resolved:

geneve: Fix use-after-free in geneve_find_dev(). (CVE-2025-21858)

In the Linux kernel, the following vulnerability has been resolved:

drop_monitor: fix incorrect initialization order (CVE-2025-21862)

In the Linux kernel, the following vulnerability has been resolved:

usbnet: gl620a: fix endpoint checking in genelink_bind() (CVE-2025-21877)

In the Linux kernel, the following vulnerability has been resolved:

vlan: enforce underlying device type (CVE-2025-21920)

In the Linux kernel, the following vulnerability has been resolved:

net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)

In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/cve/html/CVE-2025-21877.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21920.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21926.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21928.html

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-097.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26982.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35870.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57973.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57977.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57979.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57981.html

https://alas.aws.amazon.com/cve/html/CVE-2024-57986.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58020.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58069.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58071.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58083.html

https://alas.aws.amazon.com/cve/html/CVE-2024-58090.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21647.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21700.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21702.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21708.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21719.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21721.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21722.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21728.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21731.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21753.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21760.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21761.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21762.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21763.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21764.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21772.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21776.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21785.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21787.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21791.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21806.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21811.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21814.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21846.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21858.html

https://alas.aws.amazon.com/cve/html/CVE-2025-21862.html

Plugin Details

Severity: High

ID: 233712

File Name: al2_ALASKERNEL-5_4-2025-097.nasl

Version: 1.4

Type: local

Agent: unix

Published: 4/1/2025

Updated: 5/22/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-21928

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/26/2025

Vulnerability Publication Date: 4/27/2024

Reference Information

CVE: CVE-2024-26982, CVE-2024-35870, CVE-2024-57973, CVE-2024-57977, CVE-2024-57979, CVE-2024-57981, CVE-2024-57986, CVE-2024-58020, CVE-2024-58069, CVE-2024-58071, CVE-2024-58083, CVE-2024-58090, CVE-2025-21647, CVE-2025-21700, CVE-2025-21702, CVE-2025-21708, CVE-2025-21719, CVE-2025-21721, CVE-2025-21722, CVE-2025-21728, CVE-2025-21731, CVE-2025-21753, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21772, CVE-2025-21776, CVE-2025-21785, CVE-2025-21787, CVE-2025-21791, CVE-2025-21806, CVE-2025-21811, CVE-2025-21814, CVE-2025-21846, CVE-2025-21858, CVE-2025-21862, CVE-2025-21877, CVE-2025-21920, CVE-2025-21926, CVE-2025-21928