![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.2.2025.1268 |
Kategorie: | Huawei EulerOS Local Security Checks |
Titel: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1268) |
Zusammenfassung: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1268 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1268 advisory. Vulnerability Insight: dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279) sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) igb: Initialize mailbox message for VF reset(CVE-2022-48949) nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) usb: typec: altmode should keep reference to parent(CVE-2024-50150) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) net: fix data-races around sk->sk_forward_alloc(CVE-2024-53124) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) HID: core: zero-initialize the report buffer(CVE-2024-50302) firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) quota: flush quota_release_work upon quota writeback(CVE-2024-56780) mm: hugetlb: independent PMD page table shared count(CVE-2024-57883) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP9. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48949 Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50258 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50278 Common Vulnerability Exposure (CVE) ID: CVE-2024-50279 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53124 Common Vulnerability Exposure (CVE) ID: CVE-2024-53157 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 Common Vulnerability Exposure (CVE) ID: CVE-2024-57883 |
Copyright | Copyright (C) 2025 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |