Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2025.1235
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1235)
Summary:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1235 advisory.

Vulnerability Insight:
io_uring/io-wq: Use set_bit() and test_bit() at worker->flags(CVE-2024-39508)

usb: typec: altmode should keep reference to parent(CVE-2024-50150)

arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194)

netfilter: nft_payload: sanitize offset and length before calling skb_checksum()(CVE-2024-50251)

net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258)

vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264)

USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267)

dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278)

dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279)

sctp: properly validate chunk size in sctp_sf_ootb()(CVE-2024-50299)

HID: core: zero-initialize the report buffer(CVE-2024-50302)

io_uring/rw: fix missing NOWAIT check for O_DIRECT start write(CVE-2024-53052)

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057)

nfs: Fix KMSAN warning in decode_getfattr_attrs()(CVE-2024-53066)

smb: client: Fix use-after-free of network namespace.(CVE-2024-53095)

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104)

netlink: terminate outstanding dump on socket close(CVE-2024-53140)

netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141)

initramfs: avoid filename buffer overrun(CVE-2024-53142)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157)

PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739)

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747)

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP10.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-39508
Common Vulnerability Exposure (CVE) ID: CVE-2024-50150
Common Vulnerability Exposure (CVE) ID: CVE-2024-50194
Common Vulnerability Exposure (CVE) ID: CVE-2024-50251
Common Vulnerability Exposure (CVE) ID: CVE-2024-50258
Common Vulnerability Exposure (CVE) ID: CVE-2024-50264
Common Vulnerability Exposure (CVE) ID: CVE-2024-50267
Common Vulnerability Exposure (CVE) ID: CVE-2024-50278
Common Vulnerability Exposure (CVE) ID: CVE-2024-50279
Common Vulnerability Exposure (CVE) ID: CVE-2024-50299
Common Vulnerability Exposure (CVE) ID: CVE-2024-50302
Common Vulnerability Exposure (CVE) ID: CVE-2024-53052
Common Vulnerability Exposure (CVE) ID: CVE-2024-53057
Common Vulnerability Exposure (CVE) ID: CVE-2024-53066
Common Vulnerability Exposure (CVE) ID: CVE-2024-53095
Common Vulnerability Exposure (CVE) ID: CVE-2024-53104
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53141
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.