![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2025.1267 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1267) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1267 advisory. Vulnerability Insight: initramfs: avoid filename buffer overrun(CVE-2024-53142) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) mISDN: fix possible use-after-free in HFC_cleanup()(CVE-2021-47356) sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642) usb: typec: altmode should keep reference to parent(CVE-2024-50150) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) be2net: fix potential memory leak in be_xmit().(CVE-2024-50167) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) HID: core: zero-initialize the report buffer(CVE-2024-50302) NFSD: Prevent a potential integer overflow(CVE-2024-53146) hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer(CVE-2024-53103) netlink: terminate outstanding dump on socket close(CVE-2024-53140) sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket(CVE-2024-53168) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) NFSD: Prevent NULL dereference in nfsd4_process_cb_update()(CVE-2024-53217) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251) netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141) xen etfront: fix crash when removing device(CVE-2024-53240) scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739) quota: flush quota_release_work upon quota writeback(CVE-2024-56780) mm: hugetlb: independent PMD page table shared count(CVE-2024-57883) selinux: ignore unknown extended permissions(CVE-2024-57931) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP9(x86_64). Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47356 https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733 https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0 https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7 https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124 https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020 https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5 https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50167 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53103 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53168 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-53217 Common Vulnerability Exposure (CVE) ID: CVE-2024-53240 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56642 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56664 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 Common Vulnerability Exposure (CVE) ID: CVE-2024-57883 Common Vulnerability Exposure (CVE) ID: CVE-2024-57931 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |