Resource Injection Affecting kernel6.12-modules-extra package, versions <1:6.12.46-66.121.amzn2023


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-KERNEL612MODULESEXTRA-13166191
  • published1 Oct 2025
  • disclosed16 Apr 2025

Introduced: 16 Apr 2025

CVE-2025-22125  (opens in a new tab)
CWE-99  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 kernel6.12-modules-extra to version 1:6.12.46-66.121.amzn2023 or higher.
This issue was patched in ALAS2023-2025-1208.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel6.12-modules-extra package and not the kernel6.12-modules-extra package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

md/raid1,raid10: don't ignore IO flags

If blk-wbt is enabled by default, it's found that raid write performance is quite bad because all IO are throttled by wbt of underlying disks, due to flag REQ_IDLE is ignored. And turns out this behaviour exist since blk-wbt is introduced.

Other than REQ_IDLE, other flags should not be ignored as well, for example REQ_META can be set for filesystems, clearing it can cause priority reverse problems; And REQ_NOWAIT should not be cleared as well, because io will wait instead of failing directly in underlying disks.

Fix those problems by keep IO flags from master bio.

Fises: f51d46d0e7cb ("md: add support for REQ_NOWAIT")

CVSS Base Scores

version 3.1