Amazon Linux 2023 : bpftool6.12, kernel6.12, kernel6.12-devel (ALAS2023-2025-1145)

high Nessus Plugin ID 246922

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-1145 advisory.

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (CVE-2025-22115)

In the Linux kernel, the following vulnerability has been resolved:

ublk: fix race between io_uring_cmd_complete_in_task and ublk_cancel_cmd (CVE-2025-37906)

In the Linux kernel, the following vulnerability has been resolved:

crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() (CVE-2025-37984)

In the Linux kernel, the following vulnerability has been resolved:

rseq: Fix segfault on registration when rseq_cs is non-zero (CVE-2025-38067)

In the Linux kernel, the following vulnerability has been resolved:

bridge: mcast: Fix use-after-free during router port configuration (CVE-2025-38248)

In the Linux kernel, the following vulnerability has been resolved:

fs/fhandle.c: fix a race in call of has_locked_children() (CVE-2025-38306)

In the Linux kernel, the following vulnerability has been resolved:

eventpoll: don't decrement ep refcount while still holding the ep mutex (CVE-2025-38349)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix race between DIM disable and net_dim() (CVE-2025-38440)

In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape (CVE-2025-38445)

In the Linux kernel, the following vulnerability has been resolved:

drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Abort __tc_modify_qdisc if parent class does not exist (CVE-2025-38457)

In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_* TOCTOU (CVE-2025-38461)

In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_{g2h,h2g} TOCTOU (CVE-2025-38462)

In the Linux kernel, the following vulnerability has been resolved:

tcp: Correct signedness in skb remaining space calculation (CVE-2025-38463)

In the Linux kernel, the following vulnerability has been resolved:

perf: Revert to requiring CAP_SYS_ADMIN for uprobes (CVE-2025-38466)

In the Linux kernel, the following vulnerability has been resolved:

tls: always refresh the queue when reading sock (CVE-2025-38471)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)

In the Linux kernel, the following vulnerability has been resolved:

smc: Fix various oops due to inet_sock type confusion. (CVE-2025-38475)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate (CVE-2025-38477)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in crypt_message when using async crypto (CVE-2025-38488)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: make fallback action and fallback decision atomic (CVE-2025-38491)

In the Linux kernel, the following vulnerability has been resolved:

tracing/osnoise: Fix crash in timerlat_dump_stack() (CVE-2025-38493)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hid_hw_raw_request (CVE-2025-38494)

In the Linux kernel, the following vulnerability has been resolved:

HID: core: ensure the allocated report buffer can contain the reserved report ID (CVE-2025-38495)

In the Linux kernel, the following vulnerability has been resolved:

dm-bufio: fix sched in atomic context (CVE-2025-38496)

In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: Delay put pmc->idev in mld_del_delrec() (CVE-2025-38550)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel6.12 --releasever 2023.8.20250808' or or 'dnf update --advisory ALAS2023-2025-1145 --releasever 2023.8.20250808' to update your system.

See Also

https://alas.aws.amazon.com//AL2023/ALAS2023-2025-1145.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2025-22115.html

https://explore.alas.aws.amazon.com/CVE-2025-37906.html

https://explore.alas.aws.amazon.com/CVE-2025-37984.html

https://explore.alas.aws.amazon.com/CVE-2025-38067.html

https://explore.alas.aws.amazon.com/CVE-2025-38248.html

https://explore.alas.aws.amazon.com/CVE-2025-38306.html

https://explore.alas.aws.amazon.com/CVE-2025-38349.html

https://explore.alas.aws.amazon.com/CVE-2025-38440.html

https://explore.alas.aws.amazon.com/CVE-2025-38445.html

https://explore.alas.aws.amazon.com/CVE-2025-38449.html

https://explore.alas.aws.amazon.com/CVE-2025-38457.html

https://explore.alas.aws.amazon.com/CVE-2025-38461.html

https://explore.alas.aws.amazon.com/CVE-2025-38462.html

https://explore.alas.aws.amazon.com/CVE-2025-38463.html

https://explore.alas.aws.amazon.com/CVE-2025-38466.html

https://explore.alas.aws.amazon.com/CVE-2025-38471.html

https://explore.alas.aws.amazon.com/CVE-2025-38472.html

https://explore.alas.aws.amazon.com/CVE-2025-38475.html

https://explore.alas.aws.amazon.com/CVE-2025-38477.html

https://explore.alas.aws.amazon.com/CVE-2025-38488.html

https://explore.alas.aws.amazon.com/CVE-2025-38491.html

https://explore.alas.aws.amazon.com/CVE-2025-38493.html

https://explore.alas.aws.amazon.com/CVE-2025-38494.html

https://explore.alas.aws.amazon.com/CVE-2025-38495.html

https://explore.alas.aws.amazon.com/CVE-2025-38496.html

https://explore.alas.aws.amazon.com/CVE-2025-38499.html

https://explore.alas.aws.amazon.com/CVE-2025-38527.html

https://explore.alas.aws.amazon.com/CVE-2025-38550.html

Plugin Details

Severity: High

ID: 246922

File Name: al2023_ALAS2023-2025-1145.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/9/2025

Updated: 9/11/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: High

Base Score: 7.3

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:C

CVSS Score Source: CVE-2025-38471

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel6.12-devel, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.40-63.114, p-cpe:/a:amazon:linux:bpftool6.12, p-cpe:/a:amazon:linux:kernel6.12-headers, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:kernel6.12-libbpf-static, p-cpe:/a:amazon:linux:kernel6.12-libbpf-debuginfo, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-tools-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-tools, p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo, p-cpe:/a:amazon:linux:bpftool6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel6.12-tools-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf, p-cpe:/a:amazon:linux:kernel6.12-modules-extra-common, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/8/2025

Vulnerability Publication Date: 4/16/2025

Reference Information

CVE: CVE-2025-22115, CVE-2025-37906, CVE-2025-37984, CVE-2025-38067, CVE-2025-38248, CVE-2025-38306, CVE-2025-38349, CVE-2025-38440, CVE-2025-38445, CVE-2025-38449, CVE-2025-38457, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38466, CVE-2025-38471, CVE-2025-38472, CVE-2025-38475, CVE-2025-38477, CVE-2025-38488, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38499, CVE-2025-38527, CVE-2025-38550