Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2025.1267
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1267)
Summary:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory.

Vulnerability Insight:
initramfs: avoid filename buffer overrun(CVE-2024-53142)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664)

mISDN: fix possible use-after-free in HFC_cleanup()(CVE-2021-47356)

sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066)

arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194)

NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173)

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104)

USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267)

tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642)

usb: typec: altmode should keep reference to parent(CVE-2024-50150)

smb: client: Fix use-after-free of network namespace.(CVE-2024-53095)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

be2net: fix potential memory leak in be_xmit().(CVE-2024-50167)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264)

HID: core: zero-initialize the report buffer(CVE-2024-50302)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer(CVE-2024-53103)

netlink: terminate outstanding dump on socket close(CVE-2024-53140)

sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket(CVE-2024-53168)

PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194)

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057)

NFSD: Prevent NULL dereference in nfsd4_process_cb_update()(CVE-2024-53217)

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688)

netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251)

netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141)

xen
etfront: fix crash when removing device(CVE-2024-53240)

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747)

ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570)

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739)

quota: flush quota_release_work upon quota writeback(CVE-2024-56780)

mm: hugetlb: independent PMD page table shared count(CVE-2024-57883)

selinux: ignore unknown extended permissions(CVE-2024-57931)

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP9(x86_64).

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47356
https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733
https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0
https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe
https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7
https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124
https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020
https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5
https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d
https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda
Common Vulnerability Exposure (CVE) ID: CVE-2024-50150
Common Vulnerability Exposure (CVE) ID: CVE-2024-50167
Common Vulnerability Exposure (CVE) ID: CVE-2024-50194
Common Vulnerability Exposure (CVE) ID: CVE-2024-50251
Common Vulnerability Exposure (CVE) ID: CVE-2024-50264
Common Vulnerability Exposure (CVE) ID: CVE-2024-50267
Common Vulnerability Exposure (CVE) ID: CVE-2024-50299
Common Vulnerability Exposure (CVE) ID: CVE-2024-50302
Common Vulnerability Exposure (CVE) ID: CVE-2024-53057
Common Vulnerability Exposure (CVE) ID: CVE-2024-53066
Common Vulnerability Exposure (CVE) ID: CVE-2024-53095
Common Vulnerability Exposure (CVE) ID: CVE-2024-53103
Common Vulnerability Exposure (CVE) ID: CVE-2024-53104
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53141
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53168
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53217
Common Vulnerability Exposure (CVE) ID: CVE-2024-53240
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56642
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56664
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
Common Vulnerability Exposure (CVE) ID: CVE-2024-56780
Common Vulnerability Exposure (CVE) ID: CVE-2024-57883
Common Vulnerability Exposure (CVE) ID: CVE-2024-57931
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.