Amazon Linux 2023 : bpftool6.12, kernel6.12, kernel6.12-devel (ALAS2023-2025-1316)

high Nessus Plugin ID 277808

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-1316 advisory.

In the Linux kernel, the following vulnerability has been resolved:

crypto: essiv - Check ssize for decryption and in-place encryption (CVE-2025-40019)

In the Linux kernel, the following vulnerability has been resolved:

mm/ksm: fix flag-dropping behavior in ksm_madvise (CVE-2025-40040)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (CVE-2025-40042)

In the Linux kernel, the following vulnerability has been resolved:

cifs: parse_dfs_referrals: prevent oob on malformed input (CVE-2025-40099)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not assert we found block group item when creating free space tree (CVE-2025-40100)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (CVE-2025-40101)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix refcount leak for cifs_sb_tlink (CVE-2025-40103)

In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: fix mailbox API compatibility by negotiating supported features (CVE-2025-40104)

In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't leak disconnected dentries on umount (CVE-2025-40105)

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix a null-ptr access in the cursor snooper (CVE-2025-40110)

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix Use-after-free in validation (CVE-2025-40111)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable(). (CVE-2025-40133)

In the Linux kernel, the following vulnerability has been resolved:

xsk: Harden userspace-supplied xdp_desc validation (CVE-2025-40159)

In the Linux kernel, the following vulnerability has been resolved:

xen/events: Return -EEXIST for bound VIRQs (CVE-2025-40160)

In the Linux kernel, the following vulnerability has been resolved:

ext4: detect invalid INLINE_DATA + EXTENTS flag combination (CVE-2025-40167)

In the Linux kernel, the following vulnerability has been resolved:

net/ip6_tunnel: Prevent perpetual tunnel growth (CVE-2025-40173)

In the Linux kernel, the following vulnerability has been resolved:

tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176)

In the Linux kernel, the following vulnerability has been resolved:

pid: Add a judgment for ns null in pid_nr_ns (CVE-2025-40178)

In the Linux kernel, the following vulnerability has been resolved:

ext4: verify orphan file size is not too big (CVE-2025-40179)

In the Linux kernel, the following vulnerability has been resolved:

x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP (CVE-2025-40181)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (CVE-2025-40183)

In the Linux kernel, the following vulnerability has been resolved:

net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (CVE-2025-40187)

In the Linux kernel, the following vulnerability has been resolved:

ext4: guard against EA inode refcount underflow in xattr update (CVE-2025-40190)

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (CVE-2025-40194)

In the Linux kernel, the following vulnerability has been resolved:

mount: handle NULL values in mnt_ns_release() (CVE-2025-40195)

In the Linux kernel, the following vulnerability has been resolved:

fs: quota: create dedicated workqueue for quota_release_work (CVE-2025-40196)

In the Linux kernel, the following vulnerability has been resolved:

media: mc: Clear minor number before put device (CVE-2025-40197)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (CVE-2025-40198)

In the Linux kernel, the following vulnerability has been resolved:

page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches (CVE-2025-40199)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: reject negative file sizes in squashfs_read_inode() (CVE-2025-40200)

In the Linux kernel, the following vulnerability has been resolved:

kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths (CVE-2025-40201)

In the Linux kernel, the following vulnerability has been resolved:

ipmi: Rework user message limit handling (CVE-2025-40202)

In the Linux kernel, the following vulnerability has been resolved:

listmount: don't call path_put() under namespace semaphore (CVE-2025-40203)

In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix MAC comparison to be constant-time (CVE-2025-40204)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (CVE-2025-40205)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_objref: validate objref and objrefmap expressions (CVE-2025-40206)

In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (CVE-2025-40207)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel6.12 --releasever 2023.9.20251208' or or 'dnf update --advisory ALAS2023-2025-1316 --releasever 2023.9.20251208' to update your system.

See Also

https://alas.aws.amazon.com//AL2023/ALAS2023-2025-1316.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2025-40019.html

https://explore.alas.aws.amazon.com/CVE-2025-40040.html

https://explore.alas.aws.amazon.com/CVE-2025-40042.html

https://explore.alas.aws.amazon.com/CVE-2025-40099.html

https://explore.alas.aws.amazon.com/CVE-2025-40100.html

https://explore.alas.aws.amazon.com/CVE-2025-40101.html

https://explore.alas.aws.amazon.com/CVE-2025-40103.html

https://explore.alas.aws.amazon.com/CVE-2025-40104.html

https://explore.alas.aws.amazon.com/CVE-2025-40105.html

https://explore.alas.aws.amazon.com/CVE-2025-40110.html

https://explore.alas.aws.amazon.com/CVE-2025-40111.html

https://explore.alas.aws.amazon.com/CVE-2025-40133.html

https://explore.alas.aws.amazon.com/CVE-2025-40159.html

https://explore.alas.aws.amazon.com/CVE-2025-40160.html

https://explore.alas.aws.amazon.com/CVE-2025-40167.html

https://explore.alas.aws.amazon.com/CVE-2025-40173.html

https://explore.alas.aws.amazon.com/CVE-2025-40176.html

https://explore.alas.aws.amazon.com/CVE-2025-40178.html

https://explore.alas.aws.amazon.com/CVE-2025-40179.html

https://explore.alas.aws.amazon.com/CVE-2025-40181.html

https://explore.alas.aws.amazon.com/CVE-2025-40183.html

https://explore.alas.aws.amazon.com/CVE-2025-40187.html

https://explore.alas.aws.amazon.com/CVE-2025-40190.html

https://explore.alas.aws.amazon.com/CVE-2025-40194.html

https://explore.alas.aws.amazon.com/CVE-2025-40195.html

https://explore.alas.aws.amazon.com/CVE-2025-40196.html

https://explore.alas.aws.amazon.com/CVE-2025-40197.html

https://explore.alas.aws.amazon.com/CVE-2025-40198.html

https://explore.alas.aws.amazon.com/CVE-2025-40199.html

https://explore.alas.aws.amazon.com/CVE-2025-40200.html

https://explore.alas.aws.amazon.com/CVE-2025-40201.html

https://explore.alas.aws.amazon.com/CVE-2025-40202.html

https://explore.alas.aws.amazon.com/CVE-2025-40203.html

https://explore.alas.aws.amazon.com/CVE-2025-40204.html

https://explore.alas.aws.amazon.com/CVE-2025-40205.html

https://explore.alas.aws.amazon.com/CVE-2025-40206.html

https://explore.alas.aws.amazon.com/CVE-2025-40207.html

Plugin Details

Severity: High

ID: 277808

File Name: al2023_ALAS2023-2025-1316.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/9/2025

Updated: 12/9/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.7

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-40019

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo, p-cpe:/a:amazon:linux:bpftool6.12, p-cpe:/a:amazon:linux:bpftool6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-devel, p-cpe:/a:amazon:linux:kernel6.12-headers, p-cpe:/a:amazon:linux:kernel6.12-libbpf, p-cpe:/a:amazon:linux:kernel6.12-libbpf-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-libbpf-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf-static, p-cpe:/a:amazon:linux:kernel6.12-modules-extra-common, p-cpe:/a:amazon:linux:kernel6.12-tools, p-cpe:/a:amazon:linux:kernel6.12-tools-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-tools-devel, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.55-74.119

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/8/2025

Vulnerability Publication Date: 10/24/2025

Reference Information

CVE: CVE-2025-40019, CVE-2025-40040, CVE-2025-40042, CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103, CVE-2025-40104, CVE-2025-40105, CVE-2025-40110, CVE-2025-40111, CVE-2025-40133, CVE-2025-40159, CVE-2025-40160, CVE-2025-40167, CVE-2025-40173, CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40181, CVE-2025-40183, CVE-2025-40187, CVE-2025-40190, CVE-2025-40194, CVE-2025-40195, CVE-2025-40196, CVE-2025-40197, CVE-2025-40198, CVE-2025-40199, CVE-2025-40200, CVE-2025-40201, CVE-2025-40202, CVE-2025-40203, CVE-2025-40204, CVE-2025-40205, CVE-2025-40206, CVE-2025-40207