Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.2.2025.1299
Categoría:Huawei EulerOS Local Security Checks
Título:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1299)
Resumen:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1299 advisory.
Descripción:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1299 advisory.

Vulnerability Insight:
initramfs: avoid filename buffer overrun(CVE-2024-53142)

bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868)

smb: client: fix use-after-free of signing key(CVE-2024-53179)

bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664)

ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569)

RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224)

sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583)

af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606)

netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716)

leds: class: Protect brightness_show() with led_cdev->led_access mutex(CVE-2024-56587)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600)

nvme-multipath: defer partition scanning(CVE-2024-53093)

virtiofs: use pages instead of pointer for kernel direct IO(CVE-2024-53219)

mm/thp: fix deferred split unqueue naming and locking(CVE-2024-53079)

io_uring/tctx: work around xa_store() allocation error issue(CVE-2024-56584)

net: defer final 'struct net' free in netns dismantle(CVE-2024-56658)

media: v4l2-dv-timings.c: fix too strict blanking sanity checks(CVE-2022-48987)

NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173)

scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623)

tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642)

tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg(CVE-2024-56633)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

smb: client: fix NULL ptr deref in crypto_aead_setkey().(CVE-2024-53185)

blk-cgroup: Fix UAF in blkcg_unpin_online().(CVE-2024-56672)

scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

net/mlx5: fs, lock FTE when checking if active(CVE-2024-53121)

xsk: fix OOB map writes when deleting elements(CVE-2024-56614)

bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592)

media: ts2020: fix null-ptr-deref in ts2020_probe().(CVE-2024-56574)

io_uring: check if iowq is killed before queuing(CVE-2024-56709)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

ipv6: release nexthop on device removal(CVE-2024-56751)

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157)

io_uring: check for overflows in io_pin_pages(CVE-2024-53187)

virtio/vsock: Fix accept_queue ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP12(x86_64).

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-48868
Common Vulnerability Exposure (CVE) ID: CVE-2022-48987
Common Vulnerability Exposure (CVE) ID: CVE-2024-50210
Common Vulnerability Exposure (CVE) ID: CVE-2024-53079
Common Vulnerability Exposure (CVE) ID: CVE-2024-53093
Common Vulnerability Exposure (CVE) ID: CVE-2024-53103
Common Vulnerability Exposure (CVE) ID: CVE-2024-53119
Common Vulnerability Exposure (CVE) ID: CVE-2024-53121
Common Vulnerability Exposure (CVE) ID: CVE-2024-53135
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53141
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53174
Common Vulnerability Exposure (CVE) ID: CVE-2024-53179
Common Vulnerability Exposure (CVE) ID: CVE-2024-53185
Common Vulnerability Exposure (CVE) ID: CVE-2024-53187
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53219
Common Vulnerability Exposure (CVE) ID: CVE-2024-53224
Common Vulnerability Exposure (CVE) ID: CVE-2024-56569
Common Vulnerability Exposure (CVE) ID: CVE-2024-56574
Common Vulnerability Exposure (CVE) ID: CVE-2024-56583
Common Vulnerability Exposure (CVE) ID: CVE-2024-56584
Common Vulnerability Exposure (CVE) ID: CVE-2024-56587
Common Vulnerability Exposure (CVE) ID: CVE-2024-56588
Common Vulnerability Exposure (CVE) ID: CVE-2024-56592
Common Vulnerability Exposure (CVE) ID: CVE-2024-56600
Common Vulnerability Exposure (CVE) ID: CVE-2024-56601
Common Vulnerability Exposure (CVE) ID: CVE-2024-56606
Common Vulnerability Exposure (CVE) ID: CVE-2024-56611
Common Vulnerability Exposure (CVE) ID: CVE-2024-56614
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56623
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56633
Common Vulnerability Exposure (CVE) ID: CVE-2024-56642
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56650
Common Vulnerability Exposure (CVE) ID: CVE-2024-56658
Common Vulnerability Exposure (CVE) ID: CVE-2024-56662
Common Vulnerability Exposure (CVE) ID: CVE-2024-56664
Common Vulnerability Exposure (CVE) ID: CVE-2024-56672
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56703
Common Vulnerability Exposure (CVE) ID: CVE-2024-56709
Common Vulnerability Exposure (CVE) ID: CVE-2024-56716
Common Vulnerability Exposure (CVE) ID: CVE-2024-56720
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
Common Vulnerability Exposure (CVE) ID: CVE-2024-56748
Common Vulnerability Exposure (CVE) ID: CVE-2024-56751
Common Vulnerability Exposure (CVE) ID: CVE-2024-56756
Common Vulnerability Exposure (CVE) ID: CVE-2024-56763
Common Vulnerability Exposure (CVE) ID: CVE-2024-56770
Common Vulnerability Exposure (CVE) ID: CVE-2024-56779
Common Vulnerability Exposure (CVE) ID: CVE-2024-56780
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.