![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.2.2025.1267 |
Categoría: | Huawei EulerOS Local Security Checks |
Título: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1267) |
Resumen: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory. |
Descripción: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory. Vulnerability Insight: initramfs: avoid filename buffer overrun(CVE-2024-53142) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) mISDN: fix possible use-after-free in HFC_cleanup()(CVE-2021-47356) sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642) usb: typec: altmode should keep reference to parent(CVE-2024-50150) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) be2net: fix potential memory leak in be_xmit().(CVE-2024-50167) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) HID: core: zero-initialize the report buffer(CVE-2024-50302) NFSD: Prevent a potential integer overflow(CVE-2024-53146) hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer(CVE-2024-53103) netlink: terminate outstanding dump on socket close(CVE-2024-53140) sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket(CVE-2024-53168) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) NFSD: Prevent NULL dereference in nfsd4_process_cb_update()(CVE-2024-53217) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251) netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141) xen etfront: fix crash when removing device(CVE-2024-53240) scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739) quota: flush quota_release_work upon quota writeback(CVE-2024-56780) mm: hugetlb: independent PMD page table shared count(CVE-2024-57883) selinux: ignore unknown extended permissions(CVE-2024-57931) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP9(x86_64). Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47356 https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733 https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0 https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7 https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124 https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020 https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5 https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50167 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53103 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53168 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-53217 Common Vulnerability Exposure (CVE) ID: CVE-2024-53240 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56642 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56664 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 Common Vulnerability Exposure (CVE) ID: CVE-2024-57883 Common Vulnerability Exposure (CVE) ID: CVE-2024-57931 |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |