EulerOS 2.0 SP12 : kernel (EulerOS-SA-2025-1192)

critical Nessus Plugin ID 216006

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

bpf: sync_linked_regs() must preserve subreg_def(CVE-2024-53125)

nvme-multipath: defer partition scanning(CVE-2024-53093)

dm cache: fix flushing uninitialized delayed_work on cache_ctr error(CVE-2024-50280)

net: fix data-races around sk-sk_forward_alloc(CVE-2024-53124)

NFSD: Never decrement pending_async_copies on error(CVE-2024-53073)

smb: client: Fix use-after-free of network namespace.(CVE-2024-53095)

mm: resolve faulty mmap_region() error path behaviour(CVE-2024-53096)

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format(CVE-2024-53104)

arm64: probes: Fix uprobes for big-endian kernels(CVE-2024-50194)

HID: core: zero-initialize the report buffer(CVE-2024-50302)

ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find().(CVE-2024-50304)

i40e: fix race condition by adding filter's intermediate sync state(CVE-2024-53088)

media: dvbdev: prevent the risk of out of memory access(CVE-2024-53063)

dm cache: fix potential out-of-bounds access on the first resume(CVE-2024-50278)

dm cache: fix out-of-bounds access to the dirty bitset when resizing(CVE-2024-50279)

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT(CVE-2024-53057)

usb: typec: altmode should keep reference to parent(CVE-2024-50150)

vsock/virtio: Initialization of the dangling pointer occurring in vsk-trans(CVE-2024-50264)

USB: serial: io_edgeport: fix use after free in debug printk(CVE-2024-50267)

filemap: Fix bounds checking in filemap_read().(CVE-2024-50272)

sctp: properly validate chunk size in sctp_sf_ootb().(CVE-2024-50299)

bpf: Check validity of link-type in bpf_link_show_fdinfo().(CVE-2024-53099)

media: av7110: fix a spectre vulnerability(CVE-2024-50289)

RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages(CVE-2024-50208)

security/keys: fix slab-out-of-bounds in key_task_permission(CVE-2024-50301)

KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory(CVE-2024-50115)

nfs: Fix KMSAN warning in decode_getfattr_attrs().(CVE-2024-53066)

net: missing check virtio(CVE-2024-43817)

io_uring/rw: fix missing NOWAIT check for O_DIRECT start write(CVE-2024-53052)

An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.(CVE-2021-29648)

sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start(CVE-2024-49944)

be2net: fix potential memory leak in be_xmit().(CVE-2024-50167)

netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6().(CVE-2024-50256)

netfilter: nft_payload: sanitize offset and length before calling skb_checksum().(CVE-2024-50251)

net: hns3: fix kernel crash when uninstalling driver(CVE-2024-50296)

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().(CVE-2024-50154)

net: fix crash when config small gso_max_size/gso_ipv4_max_size(CVE-2024-50258)

RDMA/bnxt_re: Add a check for memory allocation(CVE-2024-50209)

netfilter: nf_tables: prevent nf_skb_duplicated corruption(CVE-2024-49952)

udf: fix uninit-value use in udf_get_fileshortad(CVE-2024-50143)

bpf: Fix out-of-bounds write in trie_get_next_key().(CVE-2024-50262)

tpm: Lock TPM chip in tpm_pm_suspend() first(CVE-2024-53085)

bpf: support non-r10 register spill/fill to/from stack in precision tracking(CVE-2023-52920)

bpf, arm64: Fix address emission with tag-based KASAN enabled(CVE-2024-50203)

mm/swapfile: skip HugeTLB pages for unuse_vma(CVE-2024-50199)

secretmem: disable memfd_secret() if arch cannot set direct map(CVE-2024-50182)

NFSD: Initialize struct nfsd4_copy earlier(CVE-2024-50241)

nvme-pci: fix race condition between reset and nvme_dev_disable().(CVE-2024-50135)

irqchip/gic-v4: Don't allow a VMOVP on a dying VPE(CVE-2024-50192)

bpf: Use raw_spinlock_t in ringbuf(CVE-2024-50138)

x86/sgx: Fix deadlock in SGX NUMA node search(CVE-2024-49856)

KVM: x86: Acquire kvm-srcu when handling KVM_SET_VCPU_EVENTS(CVE-2024-46830)

RDMA/mad: Improve handling of timed out WRs of mad agent(CVE-2024-50095)

ceph: remove the incorrect Fw reference check when dirtying pages(CVE-2024-50179)

kernel: Fix page corruption caused by racy check in __free_pages(CVE-2023-52739)

xfrm: validate new SA's prefixlen using SA family when sel.family is unset(CVE-2024-50142)

posix-clock: Fix missing timespec64 check in pc_clock_settime().(CVE-2024-50195)

iommu/vt-d: Fix double list_add when enabling VMD in scalable mode(CVE-2022-48916)

static_call: Replace pointless WARN_ON() in static_call_module_notify().(CVE-2024-49954)

tracing: Consider the NULL character when validating the event length(CVE-2024-50131)

tty: n_gsm: Fix use-after-free in gsm_cleanup_mux(CVE-2024-50073)

arm64: probes: Remove broken LDR (literal) uprobe support(CVE-2024-50099)

net: add more sanity checks to qdisc_pkt_len_init().(CVE-2024-49948)

net: avoid potential underflow in qdisc_pkt_len_init() with UFO(CVE-2024-49949)

l2tp: prevent possible tunnel refcount underflow(CVE-2024-49940)

RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency(CVE-2024-47696)

smb: client: fix OOBs when building SMB2_IOCTL request(CVE-2024-50151)

platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug(CVE-2024-49886)

resource: fix region_intersects() vs add_memory_driver_managed().(CVE-2024-49878)

sched: Fix yet more sched_fork() races(CVE-2022-48944)

sched/fair: Fix fault in reweight_entity(CVE-2022-48921)

fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name(CVE-2024-49934)

usb: xhci: Check endpoint is valid before dereferencing it(CVE-2023-52901)

gso: fix udp gso fraglist segmentation after pull from frag_list(CVE-2024-49978)

NFSD: Limit the number of concurrent async COPY operations(CVE-2024-49974)

drm/amd/display: Initialize denominators' default to 1(CVE-2024-49899)

igb: Initialize mailbox message for VF reset(CVE-2022-48949)

tipc: guard against string buffer overrun(CVE-2024-49995)

net/mlx5: Fix error path in multi-packet WQE transmit(CVE-2024-50001)

static_call: Handle module init failure correctly in static_call_del_module().(CVE-2024-50002)

blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race(CVE-2024-50082)

iommu/vt-d: Fix PCI device refcount leak in has_external_pci()(CVE-2022-49000)

drm/amd/display: Skip wbscl_set_scaler_filter if filter is null(CVE-2024-46714)

memcg: fix possible use-after-free in memcg_write_event_control().(CVE-2022-48988)

ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference(CVE-2022-48999)

drm/amd/display: Avoid overflow assignment in link_dp_cts(CVE-2024-50016)

x86/bugs: Use code segment selector for VERW operand(CVE-2024-50072)

parport: Proper fix for array out-of-bounds access(CVE-2024-50074)

net: phy: fix null-ptr-deref while probe() failed(CVE-2022-49021)

ext4: fix timer use-after-free on failed mount(CVE-2024-49960)

ext4: fix i_data_sem unlock order in ext4_ind_migrate().(CVE-2024-50006)

ext4: fix access to uninitialised lock in fc replay path(CVE-2024-50014)

bpf: Prevent tail call between progs attached to different hooks(CVE-2024-50063)

RDMA/cxgb4: Added NULL check for lookup_atid(CVE-2024-47749)

nfsd: map the EBADMSG to nfserr_io to avoid warning(CVE-2024-49875)

iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()(CVE-2022-49002)

nbd: fix race between timeout and normal completion(CVE-2024-49855)

io_uring: check if we need to reschedule during overflow flush(CVE-2024-50060)

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free(CVE-2024-49983)

net: Fix an unsafe loop on the list(CVE-2024-50024)

rtc: cmos: Fix event handler registration ordering issue(CVE-2022-48953)

gpiolib: fix memory leak in gpiochip_setup_dev().(CVE-2022-48975)

thermal: core: Reference count the zone in thermal_zone_get_by_id().(CVE-2024-50028)

nfsd: return -EINVAL when namelen is 0(CVE-2024-47692)

IB/core: Fix ib_cache_setup_one error flow cleanup(CVE-2024-47693)

efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption(CVE-2024-49858)

Bluetooth: Fix not cleanup led when bt_init fails(CVE-2022-48971)

igb: Do not bring the device up after non-fatal error(CVE-2024-50040)

uprobes: fix kernel info leak via '[uprobes]' vma(CVE-2024-49975)

serial: protect uart_port_dtr_rts() in uart_shutdown() too(CVE-2024-50058)

bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error(CVE-2024-47728)

NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies().(CVE-2024-50046)

lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc().(CVE-2024-47668)

iavf: Fix error handling in iavf_init_module().(CVE-2022-49027)

netfilter: xtables: avoid NFPROTO_UNSPEC where needed(CVE-2024-50038)

net: mdio: fix unbalanced fwnode reference count in mdio_device_release().(CVE-2022-48961)

bpf, lsm: Add check for BPF LSM return value(CVE-2024-47703)

net/sched: accept TCA_STAB only for root qdisc(CVE-2024-50039)

block: fix potential invalid pointer dereference in blk_add_partition(CVE-2024-47705)

drm/amd/display: Check null pointers before using dc-clk_mgr(CVE-2024-49907)

scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths(CVE-2024-49891)

nfsd: call cache_put if xdr_reserve_space returns NULL(CVE-2024-47737)

padata: use integer wrap around to prevent deadlock on seq_nr overflow(CVE-2024-47739)

ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev().(CVE-2024-47707)

HID: core: fix shift-out-of-bounds in hid_report_raw_event(CVE-2022-48978)

af_unix: Get user_ns from in_skb in unix_diag_get_exact().(CVE-2022-48970)

icmp: change the order of rate limits(CVE-2024-47678)

vfs: fix race between evice_inodes() and find_inode()iput().(CVE-2024-47679)

ixgbevf: Fix resource leak in ixgbevf_init_module().(CVE-2022-49028)

tipc: re-fetch skb cb after tipc_msg_validate(CVE-2022-49017)

net: tun: Fix use-after-free in tun_detach()(CVE-2022-49014)

net/mlx5e: Fix use-after-free when reverting termination table(CVE-2022-49025)

drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error(CVE-2024-47697)

smb: client: fix UAF in async decryption(CVE-2024-50047)

drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error(CVE-2024-47698)

crypto: hisilicon/qm - inject error before stopping queue(CVE-2024-47730)

bpf: Fix helper writes to read-only maps(CVE-2024-49861)

ppp: fix ppp_async_encode() illegal access(CVE-2024-50035)

cifs: Fix buffer overflow when parsing NFS reparse points(CVE-2024-49996)

libbpf: Handle size overflow for ringbuf mmap(CVE-2022-49030)

slip: make slhc_remember() more robust against malicious packets(CVE-2024-50033)

netfilter: br_netfilter: fix panic with metadata_dst skb(CVE-2024-50045)

ACPI: sysfs: validate return type of _STR method(CVE-2024-49860)

firmware_loader: Block path traversal(CVE-2024-47742)

drm/amd/display: Fix index out of bounds in degamma hardware format translation(CVE-2024-49894)

vhost/scsi: null-ptr-dereference in vhost_scsi_get_req().(CVE-2024-49863)

uprobe: avoid out-of-bounds memory access of fetching args(CVE-2024-50067)

ACPI: battery: Fix possible crash when unregistering a battery hook(CVE-2024-49955)

jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error(CVE-2024-49959)

ext4: dax: fix overflowing extents beyond inode size when partially writing(CVE-2024-50015)

udf: Fix preallocation discarding at indirect extent boundary(CVE-2022-48946)

ext4: avoid OOB when system.data xattr changes underneath the filesystem(CVE-2024-47701)

fbdev: efifb: Register sysfs groups through driver core(CVE-2024-49925)

net: do not delay dst_entries_add() in dst_release()(CVE-2024-50036)

ext4: avoid use-after-free in ext4_ext_show_leaf().(CVE-2024-49889)

ext4: fix slab-use-after-free in ext4_split_extent_at().(CVE-2024-49884)

ext4: aovid use-after-free in ext4_ext_insert_extent().(CVE-2024-49883)

ext4: fix double brelse() the buffer of the extents path(CVE-2024-49882)

ext4: update orig_path in ext4_find_extent().(CVE-2024-49881)

ACPI: PAD: fix crash in exit_round_robin().(CVE-2024-49935)

netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()(CVE-2024-47685)

scsi: fnic: Move flush_work initialization out of if block(CVE-2024-50025)

tpm: Clean up TPM space after command failure(CVE-2024-49851)

tcp: check skb is non-NULL in tcp_rto_delta_us().(CVE-2024-47684)

sock_map: Add a cond_resched() in sock_hash_free().(CVE-2024-47710)

vhost_vdpa: assign irq bypass producer token correctly(CVE-2024-47748)

mm: call the security_mmap_file() LSM hook in remap_file_pages().(CVE-2024-47745)

x86/ioapic: Handle allocation failures gracefully(CVE-2024-49927)

mm: avoid leaving partial pfn mappings around in error case(CVE-2024-47674)

blk_iocost: fix more out of bound shifts(CVE-2024-49933)

ice: protect XDP configuration with a mutex(CVE-2024-46765)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?3ed11a0f

Plugin Details

Severity: Critical

ID: 216006

File Name: EulerOS_SA-2025-1192.nasl

Version: 1.1

Type: local

Published: 2/10/2025

Updated: 2/10/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2021-29648

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2024-47685

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/10/2025

Vulnerability Publication Date: 3/30/2021

CISA Known Exploited Vulnerability Due Dates: 2/26/2025

Reference Information

CVE: CVE-2021-29648, CVE-2022-48916, CVE-2022-48921, CVE-2022-48944, CVE-2022-48946, CVE-2022-48949, CVE-2022-48953, CVE-2022-48961, CVE-2022-48970, CVE-2022-48971, CVE-2022-48975, CVE-2022-48978, CVE-2022-48988, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49014, CVE-2022-49017, CVE-2022-49021, CVE-2022-49025, CVE-2022-49027, CVE-2022-49028, CVE-2022-49030, CVE-2023-52739, CVE-2023-52901, CVE-2023-52920, CVE-2024-43817, CVE-2024-46714, CVE-2024-46765, CVE-2024-46830, CVE-2024-47668, CVE-2024-47674, CVE-2024-47678, CVE-2024-47679, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47701, CVE-2024-47703, CVE-2024-47705, CVE-2024-47707, CVE-2024-47710, CVE-2024-47728, CVE-2024-47730, CVE-2024-47737, CVE-2024-47739, CVE-2024-47742, CVE-2024-47745, CVE-2024-47748, CVE-2024-47749, CVE-2024-49851, CVE-2024-49855, CVE-2024-49856, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49863, CVE-2024-49875, CVE-2024-49878, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49889, CVE-2024-49891, CVE-2024-49894, CVE-2024-49899, CVE-2024-49907, CVE-2024-49925, CVE-2024-49927, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49940, CVE-2024-49944, CVE-2024-49948, CVE-2024-49949, CVE-2024-49952, CVE-2024-49954, CVE-2024-49955, CVE-2024-49959, CVE-2024-49960, CVE-2024-49974, CVE-2024-49975, CVE-2024-49978, CVE-2024-49983, CVE-2024-49995, CVE-2024-49996, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50014, CVE-2024-50015, CVE-2024-50016, CVE-2024-50024, CVE-2024-50025, CVE-2024-50028, CVE-2024-50033, CVE-2024-50035, CVE-2024-50036, CVE-2024-50038, CVE-2024-50039, CVE-2024-50040, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50058, CVE-2024-50060, CVE-2024-50063, CVE-2024-50067, CVE-2024-50072, CVE-2024-50073, CVE-2024-50074, CVE-2024-50082, CVE-2024-50095, CVE-2024-50099, CVE-2024-50115, CVE-2024-50131, CVE-2024-50135, CVE-2024-50138, CVE-2024-50142, CVE-2024-50143, CVE-2024-50150, CVE-2024-50151, CVE-2024-50154, CVE-2024-50167, CVE-2024-50179, CVE-2024-50182, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50199, CVE-2024-50203, CVE-2024-50208, CVE-2024-50209, CVE-2024-50241, CVE-2024-50251, CVE-2024-50256, CVE-2024-50258, CVE-2024-50262, CVE-2024-50264, CVE-2024-50267, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50289, CVE-2024-50296, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-50304, CVE-2024-53052, CVE-2024-53057, CVE-2024-53063, CVE-2024-53066, CVE-2024-53073, CVE-2024-53085, CVE-2024-53088, CVE-2024-53093, CVE-2024-53095, CVE-2024-53096, CVE-2024-53099, CVE-2024-53104, CVE-2024-53124, CVE-2024-53125