First published: Mon Jul 30 2018(Updated: )
A flaw was found in Linux Kernel in which an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients. Introduced by: <a href="https://github.com/torvalds/linux/commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8">https://github.com/torvalds/linux/commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8</a> References: <a href="https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039">https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel-alt | <0:4.14.0-115.16.1.el7a | 0:4.14.0-115.16.1.el7a |
Linux kernel | ||
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Debian | =8.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-14625 is classified as a medium severity vulnerability due to the potential for information leakage.
To fix CVE-2018-14625, update your Linux kernel to a patched version as specified in the security advisories for your distribution.
CVE-2018-14625 allows an attacker to perform an uncontrolled read from kernel memory within a VM guest.
CVE-2018-14625 affects various versions of the Linux kernel across multiple distributions including Red Hat, Debian, and Ubuntu.
CVE-2018-14625 involves the AF_VSOCK protocol which may be exploited to gather sensitive information.