Amazon Linux 2023 : bpftool, kernel6.12, kernel6.12-modules-extra (ALAS2023-2025-995)

high Nessus Plugin ID 238279

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-995 advisory.

In the Linux kernel, the following vulnerability has been resolved:

nfsd: don't ignore the return code of svc_proc_register() (CVE-2025-22026)

In the Linux kernel, the following vulnerability has been resolved:

Revert smb: client: fix TCP timers deadlock after rmmod (CVE-2025-22077)

In the Linux kernel, the following vulnerability has been resolved:

md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (CVE-2025-23141)

In the Linux kernel, the following vulnerability has been resolved:

net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod. (CVE-2025-23143)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer in can_accept_new_subflow (CVE-2025-23145)

In the Linux kernel, the following vulnerability has been resolved:

i3c: Add NULL pointer check in i3c_master_queue_ibi() (CVE-2025-23147)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off-by-one error in do_split (CVE-2025-23150)

In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: fix io_req_post_cqe abuse by send bundle (CVE-2025-23154)

In the Linux kernel, the following vulnerability has been resolved:

net: vlan: don't propagate flags on open (CVE-2025-23163)

In the Linux kernel, the following vulnerability has been resolved:

ext4: ignore xattrs past end (CVE-2025-37738)

In the Linux kernel, the following vulnerability has been resolved:

PM: hibernate: Avoid deadlock in hibernate_compressor_param_set() (CVE-2025-37745)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: move the limit validation (CVE-2025-37752)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/huc: Fix fence not released on early probe errors (CVE-2025-37754)

In the Linux kernel, the following vulnerability has been resolved:

net: tls: explicitly disallow disconnect (CVE-2025-37756)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (CVE-2025-37772)

In the Linux kernel, the following vulnerability has been resolved:

virtiofs: add filesystem context source name check (CVE-2025-37773)

In the Linux kernel, the following vulnerability has been resolved:

slab: ensure slab->obj_exts is clear in a newly allocated slab page (CVE-2025-37774)

In the Linux kernel, the following vulnerability has been resolved:

isofs: Prevent the use of too small fid (CVE-2025-37780)

In the Linux kernel, the following vulnerability has been resolved:

net: dsa: free routing table on probe failure (CVE-2025-37786)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix nested key length validation in the set() action (CVE-2025-37789)

In the Linux kernel, the following vulnerability has been resolved:

ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll() (CVE-2025-37791)

In the Linux kernel, the following vulnerability has been resolved:

codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (CVE-2025-37798)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Add cond_resched() to ftrace_graph_set_hash() (CVE-2025-37940)

In the Linux kernel, the following vulnerability has been resolved:

net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY (CVE-2025-37945)

In the Linux kernel, the following vulnerability has been resolved:

block: integrity: Do not call set_page_dirty_lock() (CVE-2025-37978)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel6.12 --releasever 2023.7.20250609' to update your system.

See Also

https://alas.aws.amazon.com/cve/html/CVE-2025-22126.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23141.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23143.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23145.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23147.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23150.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23154.html

https://alas.aws.amazon.com/cve/html/CVE-2025-23163.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37738.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37745.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37750.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37752.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37754.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37756.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37772.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37773.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37774.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37780.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37786.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37789.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37791.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37798.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37940.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37945.html

https://alas.aws.amazon.com/cve/html/CVE-2025-37978.html

https://alas.aws.amazon.com//AL2023/ALAS2023-2025-995.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2025-22026.html

https://alas.aws.amazon.com/cve/html/CVE-2025-22077.html

Plugin Details

Severity: High

ID: 238279

File Name: al2023_ALAS2023-2025-995.nasl

Version: 1.3

Type: local

Agent: unix

Published: 6/12/2025

Updated: 7/7/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:P/A:C

CVSS Score Source: CVE-2025-37750

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-libbpf-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.25-32.101, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/10/2025

Vulnerability Publication Date: 4/16/2025

Reference Information

CVE: CVE-2025-22026, CVE-2025-22077, CVE-2025-22126, CVE-2025-23141, CVE-2025-23143, CVE-2025-23145, CVE-2025-23147, CVE-2025-23150, CVE-2025-23154, CVE-2025-23163, CVE-2025-37738, CVE-2025-37745, CVE-2025-37750, CVE-2025-37752, CVE-2025-37754, CVE-2025-37756, CVE-2025-37772, CVE-2025-37773, CVE-2025-37774, CVE-2025-37780, CVE-2025-37786, CVE-2025-37789, CVE-2025-37791, CVE-2025-37798, CVE-2025-37940, CVE-2025-37945, CVE-2025-37978