Amazon Linux 2 : kernel, --advisory ALAS2KERNEL-5.4-2025-104 (ALASKERNEL-5.4-2025-104)

medium Nessus Plugin ID 241743

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.4.295-216.421. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.4-2025-104 advisory.

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix ia_size underflow (CVE-2022-48828)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_socket: fix sk refcount leaks (CVE-2024-46855)

In the Linux kernel, the following vulnerability has been resolved:

net: fix geneve_opt length integer overflow (CVE-2025-22055)

In the Linux kernel, the following vulnerability has been resolved:

HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX (CVE-2025-37942)

In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: prio: fix a race in prio_tune() (CVE-2025-38083)

In the Linux kernel, the following vulnerability has been resolved:

net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)

In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (CVE-2025-38103)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: red: fix a race in __red_change() (CVE-2025-38108)

In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: fix a potential crash on gso_skb handling (CVE-2025-38115)

In the Linux kernel, the following vulnerability has been resolved:

calipso: Don't call calipso functions for AF_INET sk. (CVE-2025-38147)

In the Linux kernel, the following vulnerability has been resolved:

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). (CVE-2025-38181)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (CVE-2025-38184)

In the Linux kernel, the following vulnerability has been resolved:

i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)

In the Linux kernel, the following vulnerability has been resolved:

ipc: fix to protect IPCS lookups using RCU (CVE-2025-38212)

In the Linux kernel, the following vulnerability has been resolved:

vgacon: Add check for vc_origin address range in vgacon_scroll() (CVE-2025-38213)

In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (CVE-2025-38214)

In the Linux kernel, the following vulnerability has been resolved:

ext4: inline: fix len overflow in ext4_prepare_inline_data (CVE-2025-38222)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix WARN() in get_bpf_raw_tp_regs (CVE-2025-38285)

In the Linux kernel, the following vulnerability has been resolved:

EDAC/skx_common: Fix general protection fault (CVE-2025-38298)

In the Linux kernel, the following vulnerability has been resolved:

fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (CVE-2025-38312)

In the Linux kernel, the following vulnerability has been resolved:

arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() (CVE-2025-38320)

In the Linux kernel, the following vulnerability has been resolved:

mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). (CVE-2025-38324)

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)

In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (CVE-2025-38337)

In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi parse and parseext cache leaks (CVE-2025-38344)

In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi operand cache leak in dswstate.c (CVE-2025-38345)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix UAF when lookup kallsym after ftrace disabled (CVE-2025-38346)

In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize (CVE-2025-38415)

In the Linux kernel, the following vulnerability has been resolved:

perf: Fix sample vs do_exit() (CVE-2025-38424)

In the Linux kernel, the following vulnerability has been resolved:

do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' or or 'yum update --advisory ALAS2KERNEL-5.4-2025-104' to update your system.

See Also

https://alas.aws.amazon.com//AL2/ALAS2KERNEL-5.4-2025-104.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2022-48828.html

https://explore.alas.aws.amazon.com/CVE-2024-46855.html

https://explore.alas.aws.amazon.com/CVE-2025-22055.html

https://explore.alas.aws.amazon.com/CVE-2025-37942.html

https://explore.alas.aws.amazon.com/CVE-2025-37958.html

https://explore.alas.aws.amazon.com/CVE-2025-38083.html

https://explore.alas.aws.amazon.com/CVE-2025-38086.html

https://explore.alas.aws.amazon.com/CVE-2025-38103.html

https://explore.alas.aws.amazon.com/CVE-2025-38108.html

https://explore.alas.aws.amazon.com/CVE-2025-38115.html

https://explore.alas.aws.amazon.com/CVE-2025-38147.html

https://explore.alas.aws.amazon.com/CVE-2025-38181.html

https://explore.alas.aws.amazon.com/CVE-2025-38184.html

https://explore.alas.aws.amazon.com/CVE-2025-38200.html

https://explore.alas.aws.amazon.com/CVE-2025-38212.html

https://explore.alas.aws.amazon.com/CVE-2025-38213.html

https://explore.alas.aws.amazon.com/CVE-2025-38214.html

https://explore.alas.aws.amazon.com/CVE-2025-38222.html

https://explore.alas.aws.amazon.com/CVE-2025-38285.html

https://explore.alas.aws.amazon.com/CVE-2025-38298.html

https://explore.alas.aws.amazon.com/CVE-2025-38312.html

https://explore.alas.aws.amazon.com/CVE-2025-38320.html

https://explore.alas.aws.amazon.com/CVE-2025-38324.html

https://explore.alas.aws.amazon.com/CVE-2025-38332.html

https://explore.alas.aws.amazon.com/CVE-2025-38337.html

https://explore.alas.aws.amazon.com/CVE-2025-38344.html

https://explore.alas.aws.amazon.com/CVE-2025-38345.html

https://explore.alas.aws.amazon.com/CVE-2025-38346.html

https://explore.alas.aws.amazon.com/CVE-2025-38352.html

https://explore.alas.aws.amazon.com/CVE-2025-38415.html

https://explore.alas.aws.amazon.com/CVE-2025-38424.html

https://explore.alas.aws.amazon.com/CVE-2025-38498.html

Plugin Details

Severity: Medium

ID: 241743

File Name: al2_ALASKERNEL-5_4-2025-104.nasl

Version: 1.7

Type: local

Agent: unix

Published: 7/10/2025

Updated: 9/10/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2024-46855

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: No known exploits are available

Patch Publication Date: 7/10/2025

Vulnerability Publication Date: 4/9/2024

CISA Known Exploited Vulnerability Due Dates: 9/25/2025

Reference Information

CVE: CVE-2022-48828, CVE-2024-46855, CVE-2025-22055, CVE-2025-37942, CVE-2025-37958, CVE-2025-38083, CVE-2025-38086, CVE-2025-38103, CVE-2025-38108, CVE-2025-38115, CVE-2025-38147, CVE-2025-38181, CVE-2025-38184, CVE-2025-38200, CVE-2025-38212, CVE-2025-38214, CVE-2025-38222, CVE-2025-38285, CVE-2025-38298, CVE-2025-38312, CVE-2025-38320, CVE-2025-38324, CVE-2025-38332, CVE-2025-38337, CVE-2025-38344, CVE-2025-38345, CVE-2025-38346, CVE-2025-38352, CVE-2025-38415, CVE-2025-38424, CVE-2025-38498