![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.2.2025.1300 |
Category: | Huawei EulerOS Local Security Checks |
Title: | Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2025-1300) |
Summary: | The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory. |
Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2025-1300 advisory. Vulnerability Insight: initramfs: avoid filename buffer overrun(CVE-2024-53142) bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868) smb: client: fix use-after-free of signing key(CVE-2024-53179) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569) RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224) sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583) af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606) netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716) leds: class: Protect brightness_show() with led_cdev->led_access mutex(CVE-2024-56587) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600) nvme-multipath: defer partition scanning(CVE-2024-53093) virtiofs: use pages instead of pointer for kernel direct IO(CVE-2024-53219) mm/thp: fix deferred split unqueue naming and locking(CVE-2024-53079) io_uring/tctx: work around xa_store() allocation error issue(CVE-2024-56584) net: defer final 'struct net' free in netns dismantle(CVE-2024-56658) media: v4l2-dv-timings.c: fix too strict blanking sanity checks(CVE-2022-48987) NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173) scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623) tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642) tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg(CVE-2024-56633) net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647) smb: client: fix NULL ptr deref in crypto_aead_setkey().(CVE-2024-53185) blk-cgroup: Fix UAF in blkcg_unpin_online().(CVE-2024-56672) scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588) crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690) vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214) net/mlx5: fs, lock FTE when checking if active(CVE-2024-53121) xsk: fix OOB map writes when deleting elements(CVE-2024-56614) bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592) media: ts2020: fix null-ptr-deref in ts2020_probe().(CVE-2024-56574) io_uring: check if iowq is killed before queuing(CVE-2024-56709) NFSD: Prevent a potential integer overflow(CVE-2024-53146) ipv6: release nexthop on device removal(CVE-2024-56751) firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157) io_uring: check for overflows in io_pin_pages(CVE-2024-53187) virtio/vsock: Fix accept_queue ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP12. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48868 Common Vulnerability Exposure (CVE) ID: CVE-2022-48987 Common Vulnerability Exposure (CVE) ID: CVE-2024-50210 Common Vulnerability Exposure (CVE) ID: CVE-2024-53079 Common Vulnerability Exposure (CVE) ID: CVE-2024-53093 Common Vulnerability Exposure (CVE) ID: CVE-2024-53103 Common Vulnerability Exposure (CVE) ID: CVE-2024-53119 Common Vulnerability Exposure (CVE) ID: CVE-2024-53121 Common Vulnerability Exposure (CVE) ID: CVE-2024-53135 Common Vulnerability Exposure (CVE) ID: CVE-2024-53140 Common Vulnerability Exposure (CVE) ID: CVE-2024-53141 Common Vulnerability Exposure (CVE) ID: CVE-2024-53142 Common Vulnerability Exposure (CVE) ID: CVE-2024-53146 Common Vulnerability Exposure (CVE) ID: CVE-2024-53157 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53174 Common Vulnerability Exposure (CVE) ID: CVE-2024-53179 Common Vulnerability Exposure (CVE) ID: CVE-2024-53185 Common Vulnerability Exposure (CVE) ID: CVE-2024-53187 Common Vulnerability Exposure (CVE) ID: CVE-2024-53194 Common Vulnerability Exposure (CVE) ID: CVE-2024-53214 Common Vulnerability Exposure (CVE) ID: CVE-2024-53219 Common Vulnerability Exposure (CVE) ID: CVE-2024-53224 Common Vulnerability Exposure (CVE) ID: CVE-2024-56569 Common Vulnerability Exposure (CVE) ID: CVE-2024-56574 Common Vulnerability Exposure (CVE) ID: CVE-2024-56583 Common Vulnerability Exposure (CVE) ID: CVE-2024-56584 Common Vulnerability Exposure (CVE) ID: CVE-2024-56587 Common Vulnerability Exposure (CVE) ID: CVE-2024-56588 Common Vulnerability Exposure (CVE) ID: CVE-2024-56592 Common Vulnerability Exposure (CVE) ID: CVE-2024-56600 Common Vulnerability Exposure (CVE) ID: CVE-2024-56601 Common Vulnerability Exposure (CVE) ID: CVE-2024-56606 Common Vulnerability Exposure (CVE) ID: CVE-2024-56611 Common Vulnerability Exposure (CVE) ID: CVE-2024-56614 Common Vulnerability Exposure (CVE) ID: CVE-2024-56615 Common Vulnerability Exposure (CVE) ID: CVE-2024-56623 Common Vulnerability Exposure (CVE) ID: CVE-2024-56631 Common Vulnerability Exposure (CVE) ID: CVE-2024-56633 Common Vulnerability Exposure (CVE) ID: CVE-2024-56642 Common Vulnerability Exposure (CVE) ID: CVE-2024-56647 Common Vulnerability Exposure (CVE) ID: CVE-2024-56650 Common Vulnerability Exposure (CVE) ID: CVE-2024-56658 Common Vulnerability Exposure (CVE) ID: CVE-2024-56662 Common Vulnerability Exposure (CVE) ID: CVE-2024-56664 Common Vulnerability Exposure (CVE) ID: CVE-2024-56672 Common Vulnerability Exposure (CVE) ID: CVE-2024-56688 Common Vulnerability Exposure (CVE) ID: CVE-2024-56690 Common Vulnerability Exposure (CVE) ID: CVE-2024-56703 Common Vulnerability Exposure (CVE) ID: CVE-2024-56709 Common Vulnerability Exposure (CVE) ID: CVE-2024-56716 Common Vulnerability Exposure (CVE) ID: CVE-2024-56720 Common Vulnerability Exposure (CVE) ID: CVE-2024-56739 Common Vulnerability Exposure (CVE) ID: CVE-2024-56747 Common Vulnerability Exposure (CVE) ID: CVE-2024-56748 Common Vulnerability Exposure (CVE) ID: CVE-2024-56751 Common Vulnerability Exposure (CVE) ID: CVE-2024-56756 Common Vulnerability Exposure (CVE) ID: CVE-2024-56763 Common Vulnerability Exposure (CVE) ID: CVE-2024-56770 Common Vulnerability Exposure (CVE) ID: CVE-2024-56779 Common Vulnerability Exposure (CVE) ID: CVE-2024-56780 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |