![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2025.1268 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1268) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1268 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1268 advisory. Vulnerability Insight: dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279) sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) igb: Initialize mailbox message for VF reset(CVE-2022-48949) nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066) arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194) net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104) USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267) usb: typec: altmode should keep reference to parent(CVE-2024-50150) smb: client: Fix use-after-free of network namespace.(CVE-2024-53095) net: fix data-races around sk->sk_forward_alloc(CVE-2024-53124) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans(CVE-2024-50264) HID: core: zero-initialize the report buffer(CVE-2024-50302) firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157) PCI: Fix use-after-free of slot->bus on hot remove(CVE-2024-53194) net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057) sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688) netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251) ovl: Filter invalid inodes with missing lookup function(CVE-2024-56570) quota: flush quota_release_work upon quota writeback(CVE-2024-56780) mm: hugetlb: independent PMD page table shared count(CVE-2024-57883) Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP9. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48949 Common Vulnerability Exposure (CVE) ID: CVE-2024-50150 Common Vulnerability Exposure (CVE) ID: CVE-2024-50194 Common Vulnerability Exposure (CVE) ID: CVE-2024-50251 Common Vulnerability Exposure (CVE) ID: CVE-2024-50258 Common Vulnerability Exposure (CVE) ID: CVE-2024-50264 Common Vulnerability Exposure (CVE) ID: CVE-2024-50267 Common Vulnerability Exposure (CVE) ID: CVE-2024-50278 Common Vulnerability Exposure (CVE) ID: CVE-2024-50279 Common Vulnerability Exposure (CVE) ID: CVE-2024-50299 Common Vulnerability Exposure (CVE) ID: CVE-2024-50302 Common Vulnerability Exposure (CVE) ID: CVE-2024-53057 Common Vulnerability Exposure (CVE) ID: CVE-2024-53066 Common Vulnerability Exposure (CVE) ID: CVE-2024-53095 Common Vulnerability Exposure (CVE) ID: CVE-2024-53104 Common Vulnerability Exposure (CVE) ID: CVE-2024-53124 Common Vulnerability Exposure (CVE) ID: CVE-2024-53157 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-56570 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 Common Vulnerability Exposure (CVE) ID: CVE-2024-57883 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |