CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
35.4%
The cumulative Virtuozzo ReadyKernel patch updated with security fixes. The patch applies to Virtuozzo kernels 3.10.0-327.18.2.vz7.15.2 (Virtuozzo 7.0.0), 3.10.0-327.36.1.vz7.18.7 (Virtuozzo 7.0.1), and 3.10.0-327.36.1.vz7.20.18 (Virtuozzo 7.0.3).
Vulnerability id: CVE-2017-7472
It was found that keyctl_set_reqkey_keyring() function leaked thread keyring which could allow an unprivileged local user to exhaust kernel memory.
Vulnerability id: CVE-2017-6353
net/sctp/socket.c in the Linux kernel through 4.10.1 did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.
Vulnerability id: CVE-2017-5986
Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 could allow local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peeled off an association in a certain buffer-full state.
Vulnerability id: CVE-2016-9793
Andrey Konovalov discovered that signed integer overflows existed in the setsockopt() system call when handling the SO_SNDBUFFORCE and SO_RCVBUFFORCE options. A local attacker with the CAP_NET_ADMIN capability could use this to cause a denial of service (system crash or memory corruption).
Vulnerability id: PSBM-56705
A vulnerability was discovered in the handling of pid namespaces in the kernel. A privileged user inside a container could trigger a kernel crash (NULL pointer dereference in proc_flush_task()) using a sequence of system calls including wait4().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Virtuozzo | 7.0 | x86_64 | readykernel-patch-15.2 | < 19.1-1.vl7 | readykernel-patch-15.2-19.1-1.vl7.x86_64.rpm |
Virtuozzo | 7.0 | x86_64 | readykernel-patch-18.7 | < 19.1-1.vl7 | readykernel-patch-18.7-19.1-1.vl7.x86_64.rpm |
Virtuozzo | 7.0 | x86_64 | readykernel-patch-20.18 | < 19.1-1.vl7 | readykernel-patch-20.18-19.1-1.vl7.x86_64.rpm |
access.redhat.com/security/cve/CVE-2016-9793
access.redhat.com/security/cve/CVE-2017-5986
access.redhat.com/security/cve/CVE-2017-6353
access.redhat.com/security/cve/CVE-2017-7472
readykernel.com/patch/Virtuozzo-7/readykernel-patch-15.2-19.1-1.vl7/
readykernel.com/patch/Virtuozzo-7/readykernel-patch-18.7-19.1-1.vl7/
readykernel.com/patch/Virtuozzo-7/readykernel-patch-20.18-19.1-1.vl7/
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
35.4%