This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Virtuozzo host is missing a security update.
According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :
- The NFSv4 server in the Linux kernel compiled with
CONFIG_NFSD_PNFS enabled does not properly validate
layout type when processing NFSv4 pNFS LAYOUTGET and
GETDEVICEINFO operands. The attack payload fits to
single one-way UDP packet. The provided input value is
used for array dereferencing. This may lead to a remote
DoS of [knfsd] and so to a soft-lockup of a whole
- A vulnerability was found in the implementation of
setsockopt() operations in the Linux kernel. A
privileged user inside a container could cause a DoS
attack on the host (kernel deadlock in ip_ra_control()
function) using a specially crafted sequence of system
Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
See also :
Update the readykernel patch.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 5.8
Public Exploit Available : false