4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.0004 Low
EPSS
Percentile
5.1%
The cumulative Virtuozzo ReadyKernel patch was updated with security fixes. The patch applies to all supported kernels of Virtuozzo Hybrid Server 7.5. NOTE: As the kernel 3.10.0-1160.41.1.vz7.183.5 has reached the end of its support period, no more ReadyKernel updates are planned for it.
Vulnerability id: CVE-2022-0617
[3.10.0-1160.41.1.vz7.183.5 to 3.10.0-1160.80.1.vz7.191.4] A null-pointer dereference after mounting a special UDF filesystem image.
Vulnerability id: RK-352
[3.10.0-1160.41.1.vz7.183.5 to 3.10.0-1160.80.1.vz7.191.4] RDMA connection is not stable enough because of the low default retry counter.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Virtuozzo Hybrid Server | 7.5 | x86_64 | readykernel-patch-191.4 | < 160.0-1.vl7 | readykernel-patch-191.4-160.0-1.vl7.x86_64.rpm |
Virtuozzo Hybrid Server | 7.5 | x86_64 | readykernel-patch-185.3 | < 160.0-1.vl7 | readykernel-patch-185.3-160.0-1.vl7.x86_64.rpm |
Virtuozzo Hybrid Server | 7.5 | x86_64 | readykernel-patch-183.5 | < 160.0-1.vl7 | readykernel-patch-183.5-160.0-1.vl7.x86_64.rpm |
4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.0004 Low
EPSS
Percentile
5.1%