![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2025.1250 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1250) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1250 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1250 advisory. Vulnerability Insight: usb: typec: altmode should keep reference to parent(CVE-2024-50150) be2net: fix potential memory leak in be_xmit()(CVE-2024-50167) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) netfilter: nft_payload: sanitize offset and length before calling skb_checksum()(CVE-2024-50251) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) sctp: properly validate chunk size in sctp_sf_ootb()(CVE-2024-50299) HID: core: zero-initialize the report buffer(CVE-2024-50302) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) nfs: Fix KMSAN warning in decode_getfattr_attrs()(CVE-2024-53066) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer(CVE-2024-53103) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) netlink: terminate outstanding dump on socket close(CVE-2024-53140) netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141) initramfs: avoid filename buffer overrun(CVE-2024-53142) NFSD: Prevent a potential integer overflow(CVE-2024-53146) sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket(CVE-2024-53168) NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) NFSD: Prevent NULL dereference in nfsd4_process_cb_update()(CVE-2024-53217) xen/ netfront: fix crash when removing device(CVE-2024-53240) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739) scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP10(x86_64). Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50167 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53103 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53168 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-53217 Common Vulnerability Exposure (CVE) ID: CVE-2024-53240 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56642 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56664 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |