EulerOS 2.0 SP11 : kernel (EulerOS-SA-2025-1931)

high Nessus Plugin ID 249204

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

gpio: Restrict usage of GPIO chip irq members before initialization(CVE-2022-49072)

mmc: core: use sysfs_emit() instead of sprintf().(CVE-2022-49267)

ipv4: Fix data-races around sysctl_fib_multipath_hash_policy.(CVE-2022-49579)

ice: Fix memory corruption in VF driver(CVE-2022-49722)

bpf: Fix memory leaks in __check_func_call(CVE-2022-49837)

ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters().(CVE-2022-49889)

drm/drm_vma_manager: Add drm_vma_node_allow_once().(CVE-2023-53001)

ext4: update s_journal_inum if it changes after journal replay(CVE-2023-53091)

tracing: Do not let histogram values have some modifiers(CVE-2023-53093)

ext4: Fix possible corruption when moving a directory(CVE-2023-53137)

media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer().(CVE-2023-53146)

kthread: unpark only parked kthread(CVE-2024-50019)

hrtimers: Handle CPU state correctly on hotplug(CVE-2024-57951)

xfrm: state: fix out-of-bounds read during lookup(CVE-2024-57982)

bpf: consider that tail calls invalidate packet pointers(CVE-2024-58237)

netem: Update sch-q.qlen before qdisc_tree_reduce_backlog().(CVE-2025-21703)

wifi: brcmfmac: Check the return value of of_property_read_string_index().(CVE-2025-21750)

smb: client: Add check for next_buffer in receive_encrypted_standard().(CVE-2025-21844)

ipvlan: ensure network headers are in skb linear part(CVE-2025-21891)

ppp: Fix KMSAN uninit-value warning with bpf(CVE-2025-21922)

net/mlx5: handle errors in mlx5_chains_create_table().(CVE-2025-21975)

ice: fix memory leak in aRFS after reset(CVE-2025-21981)

ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().(CVE-2025-22005)

nfsd: don't ignore the return code of svc_proc_register().(CVE-2025-22026)

media: streamzap: fix race between device disconnection and urb callback(CVE-2025-22027)

udp: Fix memory accounting leak.(CVE-2025-22058)

netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets.(CVE-2025-22063)

x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range().(CVE-2025-22090)

ext4: avoid journaling sb update on error if journal is destroying(CVE-2025-22113)

ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all().(CVE-2025-22121)

dlm: prevent NPD when writing a positive value to event_done(CVE-2025-23131)

thermal: int340x: Add NULL check for adev(CVE-2025-23136)

tpm: do not start chip while suspended(CVE-2025-23149)

ext4: fix off-by-one error in do_split(CVE-2025-23150)

ext4: ignore xattrs past end(CVE-2025-37738)

net_sched: sch_sfq: move the limit validation(CVE-2025-37752)

ext4: fix OOB read when checking dotdot dir(CVE-2025-37785)

bpf: Fix kmemleak warning for percpu hashmap(CVE-2025-37807)

crypto: null - Use spin lock instead of mutex(CVE-2025-37808)

jbd2: remove wrong sb-s_sequence check(CVE-2025-37839)

RDMA/core: Silence oversized kvmalloc() warning(CVE-2025-37867)

bnxt_en: Fix out-of-bound memcpy() during ethtool -w(CVE-2025-37911)

tracing: Fix oob write in trace_seq_to_buffer().(CVE-2025-37923)

iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid(CVE-2025-37927)

drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill().(CVE-2025-37930)

ftrace: Add cond_resched() to ftrace_graph_set_hash().(CVE-2025-37940)

module: ensure that kobject_put() is safe for module type kobjects(CVE-2025-37995)

clk: samsung: Fix UBSAN panic in samsung_clk_init().(CVE-2025-39728)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?0114c717

Plugin Details

Severity: High

ID: 249204

File Name: EulerOS_SA-2025-1931.nasl

Version: 1.1

Type: local

Published: 8/13/2025

Updated: 8/13/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-57951

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/9/2025

Vulnerability Publication Date: 9/12/2022

Reference Information

CVE: CVE-2022-49072, CVE-2022-49267, CVE-2022-49579, CVE-2022-49722, CVE-2022-49837, CVE-2022-49889, CVE-2023-53001, CVE-2023-53091, CVE-2023-53093, CVE-2023-53137, CVE-2023-53146, CVE-2024-50019, CVE-2024-57951, CVE-2024-57982, CVE-2024-58237, CVE-2025-21703, CVE-2025-21750, CVE-2025-21844, CVE-2025-21891, CVE-2025-21922, CVE-2025-21975, CVE-2025-21981, CVE-2025-22005, CVE-2025-22026, CVE-2025-22027, CVE-2025-22058, CVE-2025-22063, CVE-2025-22090, CVE-2025-22113, CVE-2025-22121, CVE-2025-23131, CVE-2025-23136, CVE-2025-23149, CVE-2025-23150, CVE-2025-37738, CVE-2025-37752, CVE-2025-37785, CVE-2025-37807, CVE-2025-37808, CVE-2025-37839, CVE-2025-37867, CVE-2025-37911, CVE-2025-37923, CVE-2025-37927, CVE-2025-37930, CVE-2025-37940, CVE-2025-37995, CVE-2025-39728