EulerOS 2.0 SP13 : kernel (EulerOS-SA-2025-2447)

high Nessus Plugin ID 276493

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace(CVE-2022-49932)

drivers:md:fix a potential use-after-free bug(CVE-2022-50022)

ceph: don't leak snap_rwsem in handle_cap_grant(CVE-2022-50059)

posix-cpu-timers: Cleanup CPU timers before freeing them during exec(CVE-2022-50095)

scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts(CVE-2022-50098)

sched/core: Do not requeue task on CPU excluded from cpus_mask(CVE-2022-50100)

sched, cpuset: Fix dl_cpu_busy() panic due to empty cs-cpus_allowed(CVE-2022-50103)

An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel. Note: This has been disputed by 3rd parties as not a valid vulnerability.(CVE-2023-31082)

scsi: qla2xxx: Perform lockless command completion in abort path(CVE-2023-53041)

drm/nouveau: prime: fix ttm_bo_delayed_delete oops(CVE-2025-37765)

dmaengine: idxd: fix memory leak in error handling path of idxd_alloc(CVE-2025-38015)

padata: do not leak refcount in reorder_work(CVE-2025-38031)

nvmet-tcp: don't restore null sk_state_change(CVE-2025-38035)

rseq: Fix segfault on registration when rseq_cs is non-zero(CVE-2025-38067)

libnvdimm/labels: Fix divide error in nd_label_data_init()(CVE-2025-38072)

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()(CVE-2025-38103)

net: openvswitch: Fix the dead loop of MPLS parse(CVE-2025-38146)

calipso: Don't call calipso functions for AF_INET sk.(CVE-2025-38147)

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer(CVE-2025-38184)

net: clear the dst when changing skb protocol(CVE-2025-38192)

ipc: fix to protect IPCS lookups using RCU(CVE-2025-38212)

fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var(CVE-2025-38215)

sched/rt: Fix race in push_rt_task(CVE-2025-38234)

nvme-tcp: sanitize request list handling(CVE-2025-38264)

net: tipc: fix refcount warning in tipc_aead_encrypt(CVE-2025-38273)

fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()(CVE-2025-38312)

arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()(CVE-2025-38320)

virtio-net: ensure the received length does not exceed allocated size(CVE-2025-38375)

NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN(CVE-2025-38393)

perf: Fix sample vs do_exit()(CVE-2025-38424)

net/sched: Abort __tc_modify_qdisc if parent class does not exist(CVE-2025-38457)

tipc: Fix use-after-free in tipc_conn_close().(CVE-2025-38464)

netlink: Fix wraparounds of sk-sk_rmem_alloc.(CVE-2025-38465)

perf: Revert to requiring CAP_SYS_ADMIN for uprobes(CVE-2025-38466)

do_change_type(): refuse to operate on unmounted/not ours mounts(CVE-2025-38498)

tracing: Add down_write(trace_event_sem) when adding trace event(CVE-2025-38539)

perf/core: Prevent VMA split of buffer mappings(CVE-2025-38563)

perf/core: Exit early on perf_mmap() fail(CVE-2025-38565)

pptp: ensure minimal skb length in pptp_xmit()(CVE-2025-38574)

pinmux: fix race causing mux_owner NULL with active mux_usecount(CVE-2025-38632)

i2c: qup: jump out of the loop in case of timeout(CVE-2025-38671)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?37301865

Plugin Details

Severity: High

ID: 276493

File Name: EulerOS_SA-2025-2447.nasl

Version: 1.1

Type: local

Published: 11/22/2025

Updated: 11/22/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-50095

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, p-cpe:/a:huawei:euleros:kernel, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 11/20/2025

Vulnerability Publication Date: 10/11/2022

Reference Information

CVE: CVE-2022-49932, CVE-2022-50022, CVE-2022-50059, CVE-2022-50095, CVE-2022-50098, CVE-2022-50100, CVE-2022-50103, CVE-2023-31082, CVE-2023-53041, CVE-2025-37765, CVE-2025-38015, CVE-2025-38031, CVE-2025-38035, CVE-2025-38067, CVE-2025-38072, CVE-2025-38103, CVE-2025-38146, CVE-2025-38147, CVE-2025-38184, CVE-2025-38192, CVE-2025-38212, CVE-2025-38215, CVE-2025-38234, CVE-2025-38264, CVE-2025-38273, CVE-2025-38312, CVE-2025-38320, CVE-2025-38375, CVE-2025-38393, CVE-2025-38424, CVE-2025-38457, CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38498, CVE-2025-38539, CVE-2025-38563, CVE-2025-38565, CVE-2025-38574, CVE-2025-38632, CVE-2025-38671