Vulnerability Description
A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | - |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2019:4154
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.htmlMailing ListThird Party Advisory
- https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039Third Party Advisory
- https://usn.ubuntu.com/3871-1/Third Party Advisory
- https://usn.ubuntu.com/3871-3/Third Party Advisory
- https://usn.ubuntu.com/3871-4/Third Party Advisory
- https://usn.ubuntu.com/3871-5/Third Party Advisory
- https://usn.ubuntu.com/3872-1/Third Party Advisory
- https://usn.ubuntu.com/3878-1/Third Party Advisory
- https://usn.ubuntu.com/3878-2/Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
FAQ
What is CVE-2018-14625?
CVE-2018-14625 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may all...
How severe is CVE-2018-14625?
CVE-2018-14625 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14625?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux.