This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Virtuozzo host is missing a security update.
According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :
- A kernel data leak due to an out-of-bound read was
found in the Linux kernel in
sctp_get_sctp_info() functions present since version
4.7-rc1 through version 4.13. A data leak happens when
these functions fill in sockaddr data structures used
to export socket's diagnostic information. As a result,
up to 100 bytes of the slab data could be leaked to a
- The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel through 4.11.3 is too late in
checking whether an overwrite of an skb data structure
may occur, which allows local users to cause a denial
of service (system crash) via crafted system calls.
- A divide-by-zero vulnerability was found in the
__tcp_select_window function in the Linux kernel. This
can result in a kernel panic causing a local
Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
See also :
Update the readykernel patch.
Risk factor :
Medium / CVSS Base Score : 4.9
CVSS Temporal Score : 3.6
Public Exploit Available : false