Amazon Linux 2023 : bpftool6.12, kernel6.12, kernel6.12-devel (ALAS2023-2026-1488)

high Nessus Plugin ID 304282

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1488 advisory.

In the Linux kernel, the following vulnerability has been resolved:

tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). (CVE-2025-40149)

In the Linux kernel, the following vulnerability has been resolved:

tpm2-sessions: Fix out of range indexing in name_size (CVE-2025-68792)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fallback earlier on simult connection (CVE-2025-71088)

In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: change all pageblocks migrate type on coalescing (CVE-2025-71134)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure context reset on disconnect() (CVE-2025-71144)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: avoid chain re-validation if possible (CVE-2025-71160)

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: make j1939_session_activate() fail if device is no longer registered (CVE-2025-71182)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: always detect conflicting inodes when logging inode refs (CVE-2025-71183)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix NULL dereference on root when tracing inode eviction (CVE-2025-71184)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (CVE-2026-22976)

In the Linux kernel, the following vulnerability has been resolved:

net: sock: fix hardened usercopy panic in sock_recv_errqueue (CVE-2026-22977)

In the Linux kernel, the following vulnerability has been resolved:

wifi: avoid kernel-infoleak from struct iw_point (CVE-2026-22978)

In the Linux kernel, the following vulnerability has been resolved:

net: fix memory leak in skb_segment_list for GRO packets (CVE-2026-22979)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: provide locking for v4_end_grace (CVE-2026-22980)

In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds reads in handle_auth_done() (CVE-2026-22984)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: check that server is running in unlock_filesystem (CVE-2026-22989)

In the Linux kernel, the following vulnerability has been resolved:

libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (CVE-2026-22990)

In the Linux kernel, the following vulnerability has been resolved:

libceph: make free_choose_arg_map() resilient to partial allocation (CVE-2026-22991)

In the Linux kernel, the following vulnerability has been resolved:

libceph: return the handler error from mon_handle_auth_done() (CVE-2026-22992)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix reference count leak in bpf_prog_test_run_xdp() (CVE-2026-22994)

In the Linux kernel, the following vulnerability has been resolved:

libceph: make calc_target() set t->paused, not just clear it (CVE-2026-23047)

In the Linux kernel, the following vulnerability has been resolved:

libceph: reset sparse-read state in osd_fault() (CVE-2026-23136)

In the Linux kernel, the following vulnerability has been resolved:

bpf, test_run: Subtract size of xdp_frame from allowed metadata size (CVE-2026-23140)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel6.12 --releasever 2023.10.20260325' or or 'dnf update --advisory ALAS2023-2026-1488 --releasever 2023.10.20260325' to update your system.

See Also

https://alas.aws.amazon.com//AL2023/ALAS2023-2026-1488.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2025-40149.html

https://explore.alas.aws.amazon.com/CVE-2025-68792.html

https://explore.alas.aws.amazon.com/CVE-2025-71088.html

https://explore.alas.aws.amazon.com/CVE-2025-71134.html

https://explore.alas.aws.amazon.com/CVE-2025-71144.html

https://explore.alas.aws.amazon.com/CVE-2025-71160.html

https://explore.alas.aws.amazon.com/CVE-2025-71182.html

https://explore.alas.aws.amazon.com/CVE-2025-71183.html

https://explore.alas.aws.amazon.com/CVE-2025-71184.html

https://explore.alas.aws.amazon.com/CVE-2026-22976.html

https://explore.alas.aws.amazon.com/CVE-2026-22977.html

https://explore.alas.aws.amazon.com/CVE-2026-22978.html

https://explore.alas.aws.amazon.com/CVE-2026-22979.html

https://explore.alas.aws.amazon.com/CVE-2026-22980.html

https://explore.alas.aws.amazon.com/CVE-2026-22984.html

https://explore.alas.aws.amazon.com/CVE-2026-22989.html

https://explore.alas.aws.amazon.com/CVE-2026-22990.html

https://explore.alas.aws.amazon.com/CVE-2026-22991.html

https://explore.alas.aws.amazon.com/CVE-2026-22992.html

https://explore.alas.aws.amazon.com/CVE-2026-22994.html

https://explore.alas.aws.amazon.com/CVE-2026-23047.html

https://explore.alas.aws.amazon.com/CVE-2026-23136.html

https://explore.alas.aws.amazon.com/CVE-2026-23140.html

Plugin Details

Severity: High

ID: 304282

File Name: al2023_ALAS2023-2026-1488.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/30/2026

Updated: 3/30/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-22980

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:kernel6.12-libbpf, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.66-88.122, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel6.12-libbpf-static, p-cpe:/a:amazon:linux:kernel6.12-tools-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-headers, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:bpftool6.12-debuginfo, p-cpe:/a:amazon:linux:bpftool6.12, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel6.12-modules-extra-common, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel6.12-devel, p-cpe:/a:amazon:linux:kernel6.12-tools-debuginfo, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-libbpf-devel, p-cpe:/a:amazon:linux:kernel6.12-tools

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/27/2026

Vulnerability Publication Date: 11/12/2025

Reference Information

CVE: CVE-2025-40149, CVE-2025-68792, CVE-2025-71088, CVE-2025-71134, CVE-2025-71144, CVE-2025-71160, CVE-2025-71182, CVE-2025-71183, CVE-2025-71184, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980, CVE-2026-22984, CVE-2026-22989, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-22994, CVE-2026-23047, CVE-2026-23136, CVE-2026-23140