Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.2.2025.1235
Categoría:Huawei EulerOS Local Security Checks
Título:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1235)
Resumen:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory.
Descripción:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory.

Vulnerability Insight:
io_uring/io-wq: Use set_bit() and test_bit() at worker->flags(CVE-2024-39508)

usb: typec: altmode should keep reference to parent(CVE-2024-50150)

arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194)

netfilter: nft_payload: sanitize offset and length before calling skb_checksum()(CVE-2024-50251)

net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258)

vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264)

USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267)

dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278)

dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279)

sctp: properly validate chunk size in sctp_sf_ootb()(CVE-2024-50299)

HID: core: zero-initialize the report buffer(CVE-2024-50302)

io_uring/rw: fix missing NOWAIT check for O_DIRECT start write(CVE-2024-53052)

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057)

nfs: Fix KMSAN warning in decode_getfattr_attrs()(CVE-2024-53066)

smb: client: Fix use-after-free of network namespace.(CVE-2024-53095)

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104)

netlink: terminate outstanding dump on socket close(CVE-2024-53140)

netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141)

initramfs: avoid filename buffer overrun(CVE-2024-53142)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157)

PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739)

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747)

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP10.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-39508
Common Vulnerability Exposure (CVE) ID: CVE-2024-50150
Common Vulnerability Exposure (CVE) ID: CVE-2024-50194
Common Vulnerability Exposure (CVE) ID: CVE-2024-50251
Common Vulnerability Exposure (CVE) ID: CVE-2024-50258
Common Vulnerability Exposure (CVE) ID: CVE-2024-50264
Common Vulnerability Exposure (CVE) ID: CVE-2024-50267
Common Vulnerability Exposure (CVE) ID: CVE-2024-50278
Common Vulnerability Exposure (CVE) ID: CVE-2024-50279
Common Vulnerability Exposure (CVE) ID: CVE-2024-50299
Common Vulnerability Exposure (CVE) ID: CVE-2024-50302
Common Vulnerability Exposure (CVE) ID: CVE-2024-53052
Common Vulnerability Exposure (CVE) ID: CVE-2024-53057
Common Vulnerability Exposure (CVE) ID: CVE-2024-53066
Common Vulnerability Exposure (CVE) ID: CVE-2024-53095
Common Vulnerability Exposure (CVE) ID: CVE-2024-53104
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53141
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.