![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2025.1235 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1235) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory. Vulnerability Insight: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags(CVE-2024-39508) usb: typec: altmode should keep reference to parent(CVE-2024-50150) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) netfilter: nft_payload: sanitize offset and length before calling skb_checksum()(CVE-2024-50251) net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278) dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279) sctp: properly validate chunk size in sctp_sf_ootb()(CVE-2024-50299) HID: core: zero-initialize the report buffer(CVE-2024-50302) io_uring/rw: fix missing NOWAIT check for O_DIRECT start write(CVE-2024-53052) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) nfs: Fix KMSAN warning in decode_getfattr_attrs()(CVE-2024-53066) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) netlink: terminate outstanding dump on socket close(CVE-2024-53140) netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141) initramfs: avoid filename buffer overrun(CVE-2024-53142) NFSD: Prevent a potential integer overflow(CVE-2024-53146) firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739) scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP10. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-39508 Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50258 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50278 Common Vulnerability Exposure (CVE) ID: CVE-2024-50279 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53052 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53157 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |