![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.2.2025.1300 |
Categoría: | Huawei EulerOS Local Security Checks |
Título: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1300) |
Resumen: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory. |
Descripción: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory. Vulnerability Insight: initramfs: avoid filename buffer overrun(CVE-2024-53142) bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868) smb: client: fix use-after-free of signing key(CVE-2024-53179) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569) RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224) sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583) af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606) netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716) leds: class: Protect brightness_show() with led_cdev->led_access mutex(CVE-2024-56587) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600) nvme-multipath: defer partition scanning(CVE-2024-53093) virtiofs: use pages instead of pointer for kernel direct IO(CVE-2024-53219) mm/thp: fix deferred split unqueue naming and locking(CVE-2024-53079) io_uring/tctx: work around xa_store() allocation error issue(CVE-2024-56584) net: defer final 'struct net' free in netns dismantle(CVE-2024-56658) media: v4l2-dv-timings.c: fix too strict blanking sanity checks(CVE-2022-48987) NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173) scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623) tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642) tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg(CVE-2024-56633) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) smb: client: fix NULL ptr deref in crypto_aead_setkey().(CVE-2024-53185) blk-cgroup: Fix UAF in blkcg_unpin_online().(CVE-2024-56672) scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) net/mlx5: fs, lock FTE when checking if active(CVE-2024-53121) xsk: fix OOB map writes when deleting elements(CVE-2024-56614) bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592) media: ts2020: fix null-ptr-deref in ts2020_probe().(CVE-2024-56574) io_uring: check if iowq is killed before queuing(CVE-2024-56709) NFSD: Prevent a potential integer overflow(CVE-2024-53146) ipv6: release nexthop on device removal(CVE-2024-56751) firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157) io_uring: check for overflows in io_pin_pages(CVE-2024-53187) virtio/vsock: Fix accept_queue ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP12. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48868 Common Vulnerability Exposure (CVE) ID: CVE-2022-48987 Common Vulnerability Exposure (CVE) ID: CVE-2024-50210 Common Vulnerability Exposure (CVE) ID: CVE-2024-53079 Common Vulnerability Exposure (CVE) ID: CVE-2024-53093 Common Vulnerability Exposure (CVE) ID: CVE-2024-53103 Common Vulnerability Exposure (CVE) ID: CVE-2024-53119 Common Vulnerability Exposure (CVE) ID: CVE-2024-53121 Common Vulnerability Exposure (CVE) ID: CVE-2024-53135 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53157 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53174 Common Vulnerability Exposure (CVE) ID: CVE-2024-53179 Common Vulnerability Exposure (CVE) ID: CVE-2024-53185 Common Vulnerability Exposure (CVE) ID: CVE-2024-53187 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-53219 Common Vulnerability Exposure (CVE) ID: CVE-2024-53224 Common Vulnerability Exposure (CVE) ID: CVE-2024-56569 Common Vulnerability Exposure (CVE) ID: CVE-2024-56574 Common Vulnerability Exposure (CVE) ID: CVE-2024-56583 Common Vulnerability Exposure (CVE) ID: CVE-2024-56584 Common Vulnerability Exposure (CVE) ID: CVE-2024-56587 Common Vulnerability Exposure (CVE) ID: CVE-2024-56588 Common Vulnerability Exposure (CVE) ID: CVE-2024-56592 Common Vulnerability Exposure (CVE) ID: CVE-2024-56600 Common Vulnerability Exposure (CVE) ID: CVE-2024-56601 Common Vulnerability Exposure (CVE) ID: CVE-2024-56606 Common Vulnerability Exposure (CVE) ID: CVE-2024-56611 Common Vulnerability Exposure (CVE) ID: CVE-2024-56614 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56623 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56633 Common Vulnerability Exposure (CVE) ID: CVE-2024-56642 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56650 Common Vulnerability Exposure (CVE) ID: CVE-2024-56658 Common Vulnerability Exposure (CVE) ID: CVE-2024-56662 Common Vulnerability Exposure (CVE) ID: CVE-2024-56664 Common Vulnerability Exposure (CVE) ID: CVE-2024-56672 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56703 Common Vulnerability Exposure (CVE) ID: CVE-2024-56709 Common Vulnerability Exposure (CVE) ID: CVE-2024-56716 Common Vulnerability Exposure (CVE) ID: CVE-2024-56720 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 Common Vulnerability Exposure (CVE) ID: CVE-2024-56748 Common Vulnerability Exposure (CVE) ID: CVE-2024-56751 Common Vulnerability Exposure (CVE) ID: CVE-2024-56756 Common Vulnerability Exposure (CVE) ID: CVE-2024-56763 Common Vulnerability Exposure (CVE) ID: CVE-2024-56770 Common Vulnerability Exposure (CVE) ID: CVE-2024-56779 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |