Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2025.1300
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1300)
Summary:The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory.

Vulnerability Insight:
initramfs: avoid filename buffer overrun(CVE-2024-53142)

bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868)

smb: client: fix use-after-free of signing key(CVE-2024-53179)

bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664)

ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569)

RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224)

sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583)

af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606)

netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716)

leds: class: Protect brightness_show() with led_cdev->led_access mutex(CVE-2024-56587)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600)

nvme-multipath: defer partition scanning(CVE-2024-53093)

virtiofs: use pages instead of pointer for kernel direct IO(CVE-2024-53219)

mm/thp: fix deferred split unqueue naming and locking(CVE-2024-53079)

io_uring/tctx: work around xa_store() allocation error issue(CVE-2024-56584)

net: defer final 'struct net' free in netns dismantle(CVE-2024-56658)

media: v4l2-dv-timings.c: fix too strict blanking sanity checks(CVE-2022-48987)

NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173)

scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623)

tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642)

tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg(CVE-2024-56633)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

smb: client: fix NULL ptr deref in crypto_aead_setkey().(CVE-2024-53185)

blk-cgroup: Fix UAF in blkcg_unpin_online().(CVE-2024-56672)

scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

net/mlx5: fs, lock FTE when checking if active(CVE-2024-53121)

xsk: fix OOB map writes when deleting elements(CVE-2024-56614)

bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592)

media: ts2020: fix null-ptr-deref in ts2020_probe().(CVE-2024-56574)

io_uring: check if iowq is killed before queuing(CVE-2024-56709)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

ipv6: release nexthop on device removal(CVE-2024-56751)

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157)

io_uring: check for overflows in io_pin_pages(CVE-2024-53187)

virtio/vsock: Fix accept_queue ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Huawei EulerOS V2.0SP12.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-48868
Common Vulnerability Exposure (CVE) ID: CVE-2022-48987
Common Vulnerability Exposure (CVE) ID: CVE-2024-50210
Common Vulnerability Exposure (CVE) ID: CVE-2024-53079
Common Vulnerability Exposure (CVE) ID: CVE-2024-53093
Common Vulnerability Exposure (CVE) ID: CVE-2024-53103
Common Vulnerability Exposure (CVE) ID: CVE-2024-53119
Common Vulnerability Exposure (CVE) ID: CVE-2024-53121
Common Vulnerability Exposure (CVE) ID: CVE-2024-53135
Common Vulnerability Exposure (CVE) ID: CVE-2024-53140
Common Vulnerability Exposure (CVE) ID: CVE-2024-53141
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53174
Common Vulnerability Exposure (CVE) ID: CVE-2024-53179
Common Vulnerability Exposure (CVE) ID: CVE-2024-53185
Common Vulnerability Exposure (CVE) ID: CVE-2024-53187
Common Vulnerability Exposure (CVE) ID: CVE-2024-53194
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53219
Common Vulnerability Exposure (CVE) ID: CVE-2024-53224
Common Vulnerability Exposure (CVE) ID: CVE-2024-56569
Common Vulnerability Exposure (CVE) ID: CVE-2024-56574
Common Vulnerability Exposure (CVE) ID: CVE-2024-56583
Common Vulnerability Exposure (CVE) ID: CVE-2024-56584
Common Vulnerability Exposure (CVE) ID: CVE-2024-56587
Common Vulnerability Exposure (CVE) ID: CVE-2024-56588
Common Vulnerability Exposure (CVE) ID: CVE-2024-56592
Common Vulnerability Exposure (CVE) ID: CVE-2024-56600
Common Vulnerability Exposure (CVE) ID: CVE-2024-56601
Common Vulnerability Exposure (CVE) ID: CVE-2024-56606
Common Vulnerability Exposure (CVE) ID: CVE-2024-56611
Common Vulnerability Exposure (CVE) ID: CVE-2024-56614
Common Vulnerability Exposure (CVE) ID: CVE-2024-56615
Common Vulnerability Exposure (CVE) ID: CVE-2024-56623
Common Vulnerability Exposure (CVE) ID: CVE-2024-56631
Common Vulnerability Exposure (CVE) ID: CVE-2024-56633
Common Vulnerability Exposure (CVE) ID: CVE-2024-56642
Common Vulnerability Exposure (CVE) ID: CVE-2024-56647
Common Vulnerability Exposure (CVE) ID: CVE-2024-56650
Common Vulnerability Exposure (CVE) ID: CVE-2024-56658
Common Vulnerability Exposure (CVE) ID: CVE-2024-56662
Common Vulnerability Exposure (CVE) ID: CVE-2024-56664
Common Vulnerability Exposure (CVE) ID: CVE-2024-56672
Common Vulnerability Exposure (CVE) ID: CVE-2024-56688
Common Vulnerability Exposure (CVE) ID: CVE-2024-56690
Common Vulnerability Exposure (CVE) ID: CVE-2024-56703
Common Vulnerability Exposure (CVE) ID: CVE-2024-56709
Common Vulnerability Exposure (CVE) ID: CVE-2024-56716
Common Vulnerability Exposure (CVE) ID: CVE-2024-56720
Common Vulnerability Exposure (CVE) ID: CVE-2024-56739
Common Vulnerability Exposure (CVE) ID: CVE-2024-56747
Common Vulnerability Exposure (CVE) ID: CVE-2024-56748
Common Vulnerability Exposure (CVE) ID: CVE-2024-56751
Common Vulnerability Exposure (CVE) ID: CVE-2024-56756
Common Vulnerability Exposure (CVE) ID: CVE-2024-56763
Common Vulnerability Exposure (CVE) ID: CVE-2024-56770
Common Vulnerability Exposure (CVE) ID: CVE-2024-56779
Common Vulnerability Exposure (CVE) ID: CVE-2024-56780
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.