EulerOS 2.0 SP12 : kernel (EulerOS-SA-2025-1300)

high Nessus Plugin ID 232962

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

initramfs: avoid filename buffer overrun(CVE-2024-53142)

bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720)

scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631)

dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868)

smb: client: fix use-after-free of signing key(CVE-2024-53179)

bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664)

ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569)

RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224)

sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583)

af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606)

netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716)

leds: class: Protect brightness_show() with led_cdev-led_access mutex(CVE-2024-56587)

bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615)

net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600)

nvme-multipath: defer partition scanning(CVE-2024-53093)

virtiofs: use pages instead of pointer for kernel direct IO(CVE-2024-53219)

mm/thp: fix deferred split unqueue naming and locking(CVE-2024-53079)

io_uring/tctx: work around xa_store() allocation error issue(CVE-2024-56584)

net: defer final 'struct net' free in netns dismantle(CVE-2024-56658)

media: v4l2-dv-timings.c: fix too strict blanking sanity checks(CVE-2022-48987)

NFSv4.0: Fix a use-after-free problem in the asynchronous open()(CVE-2024-53173)

scsi: qla2xxx: Fix use after free on unload(CVE-2024-56623)

tipc: Fix use-after-free of kernel socket in cleanup_bearer().(CVE-2024-56642)

tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg(CVE-2024-56633)

net: Fix icmp host relookup triggering ip_rt_bug(CVE-2024-56647)

smb: client: fix NULL ptr deref in crypto_aead_setkey().(CVE-2024-53185)

blk-cgroup: Fix UAF in blkcg_unpin_online().(CVE-2024-56672)

scsi: hisi_sas: Create all dump files during debugfs initialization(CVE-2024-56588)

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY(CVE-2024-56690)

vfio/pci: Properly hide first-in-list PCIe extended capability(CVE-2024-53214)

net/mlx5: fs, lock FTE when checking if active(CVE-2024-53121)

xsk: fix OOB map writes when deleting elements(CVE-2024-56614)

bpf: Call free_htab_elem() after htab_unlock_bucket().(CVE-2024-56592)

media: ts2020: fix null-ptr-deref in ts2020_probe().(CVE-2024-56574)

io_uring: check if iowq is killed before queuing(CVE-2024-56709)

NFSD: Prevent a potential integer overflow(CVE-2024-53146)

ipv6: release nexthop on device removal(CVE-2024-56751)

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware(CVE-2024-53157)

io_uring: check for overflows in io_pin_pages(CVE-2024-53187)

virtio/vsock: Fix accept_queue memory leak(CVE-2024-53119)

hv_sock: Initializing vsk-trans to NULL to prevent a dangling pointer(CVE-2024-53103)

netlink: terminate outstanding dump on socket close(CVE-2024-53140)

PCI: Fix use-after-free of slot-bus on hot remove(CVE-2024-53194)

mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM(CVE-2024-56611)

nvme-pci: fix freeing of the HMB descriptor table(CVE-2024-56756)

scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb().(CVE-2024-56748)

SUNRPC: make sure cache entry active before cache_sho(CVE-2024-53174)

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport(CVE-2024-56688)

netfilter: ipset: add missing range check in bitmap_ip_uadt(CVE-2024-53141)

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()(CVE-2024-56747)

KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN(CVE-2024-53135)

netfilter: x_tables: fix LED ID check in led_tg_check().(CVE-2024-56650)

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()(CVE-2024-56739)

acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl(CVE-2024-56662)

ipv6: Fix soft lockups in fib6_select_path under high next hop churn(CVE-2024-56703)

tracing: Prevent bad count for tracing_cpumask_write(CVE-2024-56763)

quota: flush quota_release_work upon quota writeback(CVE-2024-56780)

net: inet: do not leave a dangling sk pointer in inet_create().(CVE-2024-56601)

nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur(CVE-2024-56779)

net/sched: netem: account for backlog updates from child qdisc(CVE-2024-56770)

posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime().(CVE-2024-50210)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?dbff09ad

Plugin Details

Severity: High

ID: 232962

File Name: EulerOS_SA-2025-1300.nasl

Version: 1.1

Type: local

Published: 3/20/2025

Updated: 3/20/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-56658

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/17/2025

Vulnerability Publication Date: 1/18/2023

Reference Information

CVE: CVE-2022-48868, CVE-2022-48987, CVE-2024-50210, CVE-2024-53079, CVE-2024-53093, CVE-2024-53103, CVE-2024-53119, CVE-2024-53121, CVE-2024-53135, CVE-2024-53140, CVE-2024-53141, CVE-2024-53142, CVE-2024-53146, CVE-2024-53157, CVE-2024-53173, CVE-2024-53174, CVE-2024-53179, CVE-2024-53185, CVE-2024-53187, CVE-2024-53194, CVE-2024-53214, CVE-2024-53219, CVE-2024-53224, CVE-2024-56569, CVE-2024-56574, CVE-2024-56583, CVE-2024-56584, CVE-2024-56587, CVE-2024-56588, CVE-2024-56592, CVE-2024-56600, CVE-2024-56601, CVE-2024-56606, CVE-2024-56611, CVE-2024-56614, CVE-2024-56615, CVE-2024-56623, CVE-2024-56631, CVE-2024-56633, CVE-2024-56642, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56662, CVE-2024-56664, CVE-2024-56672, CVE-2024-56688, CVE-2024-56690, CVE-2024-56703, CVE-2024-56709, CVE-2024-56716, CVE-2024-56720, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56751, CVE-2024-56756, CVE-2024-56763, CVE-2024-56770, CVE-2024-56779, CVE-2024-56780