Vulnerability CVE-2018-14625: Information
Description
A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
Severity: HIGH (7.0) Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Fixed packages
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039 |
|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625 |
|
USN-3872-1 |
|
USN-3871-1 |
|
USN-3878-1 |
|
USN-3871-4 |
|
USN-3871-3 |
|
USN-3878-2 |
|
USN-3871-5 |
|
[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update |
|
RHSA-2019:2043 | |
RHSA-2019:2029 | |
RHSA-2019:4154 |