EulerOS 2.0 SP10 : kernel (EulerOS-SA-2026-1050)

high Nessus Plugin ID 284771

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

media: uvcvideo: Handle cameras with invalid descriptors(CVE-2023-53437)

scsi: target: iscsi: Fix a race condition between login_work and the login thread(CVE-2022-50350)

crypto: cavium - prevent integer overflow loading firmware(CVE-2022-50330)

HID: core: do not bypass hid_hw_raw_request(CVE-2025-38494)

tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak(CVE-2022-50389)

scsi: qla4xxx: Add length check when parsing nlattrs(CVE-2023-53456)

virtio-mmio: don't break lifecycle of vm_dev(CVE-2023-53515)

scsi: qla2xxx: Pointer may be dereferenced(CVE-2023-53150)

tracing/histograms: Add histograms to hist_vars if they have referenced variables(CVE-2023-53560)

fs: writeback: fix use-after-free in __mark_inode_dirty()(CVE-2025-39866)

ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS(CVE-2022-50315)

pnode: terminate at peers of source(CVE-2022-50280)

drm/sched: Increment job count before swapping tail spsc queue(CVE-2025-38515)

tracing: Fix race issue between cpu buffer write and swap(CVE-2023-53368)

usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()(CVE-2022-50544)

mtd: Fix device name leak when register device failed in add_mtd_device()(CVE-2022-50566)

ext4: add bounds checking in get_max_inline_xattr_value_size()(CVE-2023-53285)

tee: fix NULL pointer dereference in tee_shm_put(CVE-2025-39865)

crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg(CVE-2025-39964)

do_change_type(): refuse to operate on unmounted/not ours mounts(CVE-2025-38498)

drm/gem: Acquire references on GEM handles for framebuffers(CVE-2025-38449)

dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path(CVE-2023-53604)

qede: confirm skb is allocated before using(CVE-2022-49084)

recordmcount: Fix memory leaks in the uwrite function(CVE-2023-53318)

ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer(CVE-2023-53395)

usb: net: sierra: check for no status endpoint(CVE-2025-38474)

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()(CVE-2025-38352)

ext4: avoid deadlock in fs reclaim with page writeback(CVE-2023-53149)

kobject: Add sanity check for kset-kobj.ktype in kset_register()(CVE-2023-53480)

PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free(CVE-2023-53446)

tracing: Limit access to parser-buffer when trace_get_user failed(CVE-2025-39683)

binfmt_misc: fix shift-out-of-bounds in check_special_flags(CVE-2022-50497)

arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()(CVE-2025-38320)

udf: Fix uninitialized array access for some pathnames(CVE-2023-53165)

ext4: avoid crash when inline data creation follows DIO write(CVE-2022-50435)

serial: 8250: Reinit port-pm on port specific driver unbind(CVE-2023-53176)

rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails(CVE-2023-53307)

udf: Do not bother merging very long extents(CVE-2023-53506)

spi: qup: Don't skip cleanup in remove's error path(CVE-2023-53567)

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().(CVE-2025-38181)

ftrace: Also allocate and copy hash for reading of filter files(CVE-2025-39689)

xhci: Remove device endpoints from bandwidth list when freeing the device(CVE-2022-50470)

usbnet: Fix linkwatch use-after-free on disconnect(CVE-2022-50220)

fs: udf: fix OOB read in lengthAllocDescs handling(CVE-2025-40044)

blk-mq: use quiesced elevator switch when reinitializing queues(CVE-2022-50552)

ext4: fix WARNING in mb_find_extent(CVE-2023-53317)

posix-timers: Ensure timer ID search-loop limit is valid(CVE-2023-53728)

net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb(CVE-2023-53548)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?ab61afd7

Plugin Details

Severity: High

ID: 284771

File Name: EulerOS_SA-2026-1050.nasl

Version: 1.1

Type: local

Published: 1/15/2026

Updated: 1/15/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-39689

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/13/2026

Vulnerability Publication Date: 9/4/2021

CISA Known Exploited Vulnerability Due Dates: 9/25/2025

Reference Information

CVE: CVE-2022-49084, CVE-2022-50220, CVE-2022-50280, CVE-2022-50315, CVE-2022-50330, CVE-2022-50350, CVE-2022-50389, CVE-2022-50435, CVE-2022-50470, CVE-2022-50497, CVE-2022-50544, CVE-2022-50552, CVE-2022-50566, CVE-2023-53149, CVE-2023-53150, CVE-2023-53165, CVE-2023-53176, CVE-2023-53285, CVE-2023-53307, CVE-2023-53317, CVE-2023-53318, CVE-2023-53368, CVE-2023-53395, CVE-2023-53437, CVE-2023-53446, CVE-2023-53456, CVE-2023-53480, CVE-2023-53506, CVE-2023-53515, CVE-2023-53548, CVE-2023-53560, CVE-2023-53567, CVE-2023-53604, CVE-2023-53728, CVE-2025-38181, CVE-2025-38320, CVE-2025-38352, CVE-2025-38449, CVE-2025-38474, CVE-2025-38494, CVE-2025-38498, CVE-2025-38515, CVE-2025-39683, CVE-2025-39689, CVE-2025-39865, CVE-2025-39866, CVE-2025-39964, CVE-2025-40044