CVE-2018-14625

high

Description

A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.

References

https://usn.ubuntu.com/3878-2/

https://usn.ubuntu.com/3878-1/

https://usn.ubuntu.com/3872-1/

https://usn.ubuntu.com/3871-5/

https://usn.ubuntu.com/3871-4/

https://usn.ubuntu.com/3871-3/

https://usn.ubuntu.com/3871-1/

https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039

https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625

https://access.redhat.com/errata/RHSA-2019:4154

https://access.redhat.com/errata/RHSA-2019:2043

https://access.redhat.com/errata/RHSA-2019:2029

Details

Source: Mitre, NVD

Published: 2018-09-10

Risk Information

CVSS v2

Base Score: 4.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High