- Home
- CVEs with nessus.description==According to the version of the vzkernel package and the
readykernel-patch installed, the Virtuozzo installation on the remote
host is affected by the following vulnerabilities :
- The NFSv4 server in the Linux kernel compiled with
CONFIG_NFSD_PNFS enabled does not properly validate
layout type when processing NFSv4 pNFS LAYOUTGET and
GETDEVICEINFO operands. The attack payload fits to
single one-way UDP packet. The provided input value is
used for array dereferencing. This may lead to a remote
DoS of [knfsd] and so to a soft-lockup of a whole
system.
- A flaw was found in the way Linux kernel allocates heap
memory to build the scattergather list from a fragment
list(skb_shinfo(skb)->frag_list) in the socket
buffer(skb_buff). The heap overflow occurred if
'MAX_SKB_FRAGS 1' parameter and 'NETIF_F_FRAGLIST'
feature are both used together. A remote user or
process could use this flaw to potentially escalate
their privilege on a system.
- A vulnerability was found in the implementation of
setsockopt() operations in the Linux kernel. A
privileged user inside a container could cause a DoS
attack on the host (kernel deadlock in ip_ra_control()
function) using a specially crafted sequence of system
calls.
Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top