Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2025-1186)

high Nessus Plugin ID 264826

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-1186 advisory.

In the Linux kernel, the following vulnerability has been resolved:

tls: separate no-async decryption request handling from async (CVE-2024-58240)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: make fallback action and fallback decision atomic (CVE-2025-38491)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: plug races between subflow fail and subflow creation (CVE-2025-38552)

In the Linux kernel, the following vulnerability has been resolved:

eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)

In the Linux kernel, the following vulnerability has been resolved:

arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (CVE-2025-38670)

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Avoid stack buffer overflow from kernel cmdline (CVE-2025-38676)

In the Linux kernel, the following vulnerability has been resolved:

mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (CVE-2025-38681)

In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix panic during namespace deletion with VF (CVE-2025-38683)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes (CVE-2025-38684)

In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (CVE-2025-38685)

In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix uninited ptr deref in block/scsi layout (CVE-2025-38691)

In the Linux kernel, the following vulnerability has been resolved:

scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (CVE-2025-38700)

In the Linux kernel, the following vulnerability has been resolved:

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (CVE-2025-38701)

In the Linux kernel, the following vulnerability has been resolved:

fbdev: fix potential buffer overflow in do_register_framebuffer() (CVE-2025-38702)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add sanity check for file name (CVE-2025-38707)

In the Linux kernel, the following vulnerability has been resolved:

drbd: add missing kref_get in handle_write_conflicts (CVE-2025-38708)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump (CVE-2025-38721)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)

In the Linux kernel, the following vulnerability has been resolved:

smb3: fix for slab out of bounds on mount to ksmbd (CVE-2025-38728)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject: don't leak dst refcount for loopback packets (CVE-2025-38732)

In the Linux kernel, the following vulnerability has been resolved:

ppp: fix race conditions in ppp_fill_forward_path (CVE-2025-39673)

In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (CVE-2025-39681)

In the Linux kernel, the following vulnerability has been resolved:

tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Limit access to parser->buffer when trace_get_user failed (CVE-2025-39683)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Also allocate and copy hash for reading of filter files (CVE-2025-39689)

In the Linux kernel, the following vulnerability has been resolved:

fs/buffer: fix use-after-free when call bh_read() helper (CVE-2025-39691)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a race when updating an existing write (CVE-2025-39697)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time (CVE-2025-39702)

In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: fix panic due to PSLVERR (CVE-2025-39724)

In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock (CVE-2025-39736)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not allow relocation of partially dropped subvolumes (CVE-2025-39738)

In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect ->defer_qs_iw_pending from data race (CVE-2025-39749)

In the Linux kernel, the following vulnerability has been resolved:

fs: Prevent file descriptor table allocations exceeding INT_MAX (CVE-2025-39756)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix race between quota disable and quota rescan ioctl (CVE-2025-39759)

In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing (CVE-2025-39760)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (CVE-2025-39766)

In the Linux kernel, the following vulnerability has been resolved:

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (CVE-2025-39770)

In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix soft lockup in br_multicast_query_expired() (CVE-2025-39773)

In the Linux kernel, the following vulnerability has been resolved:

jbd2: prevent softlockup in jbd2_log_do_checkpoint() (CVE-2025-39782)

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix configfs group list head handling (CVE-2025-39783)

In the Linux kernel, the following vulnerability has been resolved:

block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (CVE-2025-39795)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix the setting of capabilities when automounting a new filesystem (CVE-2025-39798)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (CVE-2025-39800)

In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (CVE-2025-39806)

In the Linux kernel, the following vulnerability has been resolved:

sctp: initialize more fields in sctp_v6_from_sk() (CVE-2025-39812)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (CVE-2025-39813)

In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)

In the Linux kernel, the following vulnerability has been resolved:

fs/smb: Fix inconsistent refcnt update (CVE-2025-39819)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest (CVE-2025-39823)

In the Linux kernel, the following vulnerability has been resolved:

HID: asus: fix UAF via HID_CLAIMED_INPUT validation (CVE-2025-39824)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix race with concurrent opens in rename(2) (CVE-2025-39825)

In the Linux kernel, the following vulnerability has been resolved:

xfs: do not propagate ENODATA disk errors into xattr code (CVE-2025-39835)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel --releasever 2023.8.20250915' or or 'dnf update --advisory ALAS2023-2025-1186 --releasever 2023.8.20250915' to update your system.

See Also

https://alas.aws.amazon.com//AL2023/ALAS2023-2025-1186.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2024-58240.html

https://explore.alas.aws.amazon.com/CVE-2025-37750.html

https://explore.alas.aws.amazon.com/CVE-2025-38491.html

https://explore.alas.aws.amazon.com/CVE-2025-38552.html

https://explore.alas.aws.amazon.com/CVE-2025-38614.html

https://explore.alas.aws.amazon.com/CVE-2025-38670.html

https://explore.alas.aws.amazon.com/CVE-2025-38676.html

https://explore.alas.aws.amazon.com/CVE-2025-38681.html

https://explore.alas.aws.amazon.com/CVE-2025-38683.html

https://explore.alas.aws.amazon.com/CVE-2025-38684.html

https://explore.alas.aws.amazon.com/CVE-2025-38685.html

https://explore.alas.aws.amazon.com/CVE-2025-38691.html

https://explore.alas.aws.amazon.com/CVE-2025-38700.html

https://explore.alas.aws.amazon.com/CVE-2025-38701.html

https://explore.alas.aws.amazon.com/CVE-2025-38702.html

https://explore.alas.aws.amazon.com/CVE-2025-38707.html

https://explore.alas.aws.amazon.com/CVE-2025-38708.html

https://explore.alas.aws.amazon.com/CVE-2025-38721.html

https://explore.alas.aws.amazon.com/CVE-2025-38724.html

https://explore.alas.aws.amazon.com/CVE-2025-38728.html

https://explore.alas.aws.amazon.com/CVE-2025-38732.html

https://explore.alas.aws.amazon.com/CVE-2025-39673.html

https://explore.alas.aws.amazon.com/CVE-2025-39681.html

https://explore.alas.aws.amazon.com/CVE-2025-39682.html

https://explore.alas.aws.amazon.com/CVE-2025-39683.html

https://explore.alas.aws.amazon.com/CVE-2025-39689.html

https://explore.alas.aws.amazon.com/CVE-2025-39691.html

https://explore.alas.aws.amazon.com/CVE-2025-39697.html

https://explore.alas.aws.amazon.com/CVE-2025-39702.html

https://explore.alas.aws.amazon.com/CVE-2025-39718.html

https://explore.alas.aws.amazon.com/CVE-2025-39724.html

https://explore.alas.aws.amazon.com/CVE-2025-39736.html

https://explore.alas.aws.amazon.com/CVE-2025-39738.html

https://explore.alas.aws.amazon.com/CVE-2025-39749.html

https://explore.alas.aws.amazon.com/CVE-2025-39756.html

https://explore.alas.aws.amazon.com/CVE-2025-39759.html

https://explore.alas.aws.amazon.com/CVE-2025-39760.html

https://explore.alas.aws.amazon.com/CVE-2025-39766.html

https://explore.alas.aws.amazon.com/CVE-2025-39770.html

https://explore.alas.aws.amazon.com/CVE-2025-39773.html

https://explore.alas.aws.amazon.com/CVE-2025-39782.html

https://explore.alas.aws.amazon.com/CVE-2025-39783.html

https://explore.alas.aws.amazon.com/CVE-2025-39795.html

https://explore.alas.aws.amazon.com/CVE-2025-39798.html

https://explore.alas.aws.amazon.com/CVE-2025-39800.html

https://explore.alas.aws.amazon.com/CVE-2025-39806.html

https://explore.alas.aws.amazon.com/CVE-2025-39812.html

https://explore.alas.aws.amazon.com/CVE-2025-39813.html

https://explore.alas.aws.amazon.com/CVE-2025-39817.html

https://explore.alas.aws.amazon.com/CVE-2025-39819.html

https://explore.alas.aws.amazon.com/CVE-2025-39823.html

https://explore.alas.aws.amazon.com/CVE-2025-39824.html

https://explore.alas.aws.amazon.com/CVE-2025-39825.html

https://explore.alas.aws.amazon.com/CVE-2025-39835.html

Plugin Details

Severity: High

ID: 264826

File Name: al2023_ALAS2023-2025-1186.nasl

Version: 1.5

Type: local

Agent: unix

Published: 9/15/2025

Updated: 10/6/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38702

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-libbpf-static, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-libbpf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.150-174.273

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: No known exploits are available

Patch Publication Date: 9/15/2025

Vulnerability Publication Date: 5/1/2025

Reference Information

CVE: CVE-2024-58240, CVE-2025-37750, CVE-2025-38491, CVE-2025-38552, CVE-2025-38614, CVE-2025-38670, CVE-2025-38676, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684, CVE-2025-38685, CVE-2025-38691, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702, CVE-2025-38707, CVE-2025-38708, CVE-2025-38721, CVE-2025-38724, CVE-2025-38728, CVE-2025-38732, CVE-2025-39673, CVE-2025-39681, CVE-2025-39682, CVE-2025-39683, CVE-2025-39689, CVE-2025-39691, CVE-2025-39697, CVE-2025-39702, CVE-2025-39718, CVE-2025-39724, CVE-2025-39736, CVE-2025-39738, CVE-2025-39749, CVE-2025-39756, CVE-2025-39759, CVE-2025-39760, CVE-2025-39766, CVE-2025-39770, CVE-2025-39773, CVE-2025-39782, CVE-2025-39783, CVE-2025-39795, CVE-2025-39798, CVE-2025-39800, CVE-2025-39806, CVE-2025-39812, CVE-2025-39813, CVE-2025-39817, CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825, CVE-2025-39835