Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.2.2025.1317
Categoría:Huawei EulerOS Local Security Checks
Título:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1317)
Resumen:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1317 advisory.
Descripción:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1317 advisory.

Vulnerability Insight:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock(CVE-2024-43098)

KVM: arm64: Get rid of userspace_irqchip_in_use(CVE-2024-53195)

virtio-blk: don't keep queue frozen during system suspend(CVE-2024-57946)

workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker(CVE-2024-57888)

mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim().(CVE-2024-57884)

net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue(CVE-2025-21650)

ceph: give up on paths longer than PATH_MAX(CVE-2024-53685)

net: hns3: fix kernel crash when 1588 is sent on HIP08 devices(CVE-2025-21649)

drm/dp_mst: Fix resetting msg rx state after topology removal(CVE-2024-57876)

arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL(CVE-2024-57874)

hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur(CVE-2025-21656)

mm: hugetlb: independent PMD page table shared count(CVE-2024-57883)

Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet(CVE-2024-55916)

netfilter: IDLETIMER: Fix for possible ABBA deadlock(CVE-2024-54683)

scsi: megaraid_sas: Fix for a potential deadlock(CVE-2024-57807)

bpf: Prevent tailcall infinite loop caused by freplace(CVE-2024-47794)

fs: relax assertions on failure to encode file handles(CVE-2024-57924)

smb: client: fix TCP timers deadlock after rmmod(CVE-2024-54680)

media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal().(CVE-2024-56572)

net/sched: netem: account for backlog updates from child qdisc(CVE-2024-56770)

nvme-rdma: unquiesce admin_q before destroy it(CVE-2024-49569)

nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur(CVE-2024-56779)

netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716)

xsk: fix OOB map writes when deleting elements(CVE-2024-56614)

bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720)

net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600)

af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606)

NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173)

pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking(CVE-2024-57889)

drm/modes: Avoid divide by zero harder in drm_mode_vrefresh().(CVE-2024-56369)

scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588)

scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623)

RDMA/hns: Fix cpu stuck caused by printings during reset(CVE-2024-56722)

bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592)

ipv6: release nexthop on device removal(CVE-2024-56751)

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

net: Fix icmp host ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP13.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-48987
Common Vulnerability Exposure (CVE) ID: CVE-2024-43098
Common Vulnerability Exposure (CVE) ID: CVE-2024-47794
Common Vulnerability Exposure (CVE) ID: CVE-2024-49569
Common Vulnerability Exposure (CVE) ID: CVE-2024-50210
Common Vulnerability Exposure (CVE) ID: CVE-2024-53103
Common Vulnerability Exposure (CVE) ID: CVE-2024-53135
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53174
Common Vulnerability Exposure (CVE) ID: CVE-2024-53179
Common Vulnerability Exposure (CVE) ID: CVE-2024-53185
Common Vulnerability Exposure (CVE) ID: CVE-2024-53187
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53195
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53219
Common Vulnerability Exposure (CVE) ID: CVE-2024-53224
Common Vulnerability Exposure (CVE) ID: CVE-2024-53685
Common Vulnerability Exposure (CVE) ID: CVE-2024-54680
Common Vulnerability Exposure (CVE) ID: CVE-2024-54683
Common Vulnerability Exposure (CVE) ID: CVE-2024-55916
Common Vulnerability Exposure (CVE) ID: CVE-2024-56369
Common Vulnerability Exposure (CVE) ID: CVE-2024-56549
Common Vulnerability Exposure (CVE) ID: CVE-2024-56569
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56572
Common Vulnerability Exposure (CVE) ID: CVE-2024-56574
Common Vulnerability Exposure (CVE) ID: CVE-2024-56583
Common Vulnerability Exposure (CVE) ID: CVE-2024-56584
Common Vulnerability Exposure (CVE) ID: CVE-2024-56587
Common Vulnerability Exposure (CVE) ID: CVE-2024-56588
Common Vulnerability Exposure (CVE) ID: CVE-2024-56592
Common Vulnerability Exposure (CVE) ID: CVE-2024-56600
Common Vulnerability Exposure (CVE) ID: CVE-2024-56601
Common Vulnerability Exposure (CVE) ID: CVE-2024-56606
Common Vulnerability Exposure (CVE) ID: CVE-2024-56611
Common Vulnerability Exposure (CVE) ID: CVE-2024-56614
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56623
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56633
Common Vulnerability Exposure (CVE) ID: CVE-2024-56642
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56650
Common Vulnerability Exposure (CVE) ID: CVE-2024-56658
Common Vulnerability Exposure (CVE) ID: CVE-2024-56662
Common Vulnerability Exposure (CVE) ID: CVE-2024-56664
Common Vulnerability Exposure (CVE) ID: CVE-2024-56672
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56703
Common Vulnerability Exposure (CVE) ID: CVE-2024-56709
Common Vulnerability Exposure (CVE) ID: CVE-2024-56716
Common Vulnerability Exposure (CVE) ID: CVE-2024-56720
Common Vulnerability Exposure (CVE) ID: CVE-2024-56722
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
Common Vulnerability Exposure (CVE) ID: CVE-2024-56748
Common Vulnerability Exposure (CVE) ID: CVE-2024-56751
Common Vulnerability Exposure (CVE) ID: CVE-2024-56756
Common Vulnerability Exposure (CVE) ID: CVE-2024-56763
Common Vulnerability Exposure (CVE) ID: CVE-2024-56769
Common Vulnerability Exposure (CVE) ID: CVE-2024-56770
Common Vulnerability Exposure (CVE) ID: CVE-2024-56779
Common Vulnerability Exposure (CVE) ID: CVE-2024-56780
Common Vulnerability Exposure (CVE) ID: CVE-2024-57807
Common Vulnerability Exposure (CVE) ID: CVE-2024-57874
Common Vulnerability Exposure (CVE) ID: CVE-2024-57876
Common Vulnerability Exposure (CVE) ID: CVE-2024-57883
Common Vulnerability Exposure (CVE) ID: CVE-2024-57884
Common Vulnerability Exposure (CVE) ID: CVE-2024-57888
Common Vulnerability Exposure (CVE) ID: CVE-2024-57889
Common Vulnerability Exposure (CVE) ID: CVE-2024-57924
Common Vulnerability Exposure (CVE) ID: CVE-2024-57946
Common Vulnerability Exposure (CVE) ID: CVE-2025-21649
Common Vulnerability Exposure (CVE) ID: CVE-2025-21650
Common Vulnerability Exposure (CVE) ID: CVE-2025-21656
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.