CVE-2018-14625

A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
References
Link Resource
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:4154
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html Mailing List Third Party Advisory
https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039 Third Party Advisory
https://usn.ubuntu.com/3871-1/ Third Party Advisory
https://usn.ubuntu.com/3871-3/ Third Party Advisory
https://usn.ubuntu.com/3871-4/ Third Party Advisory
https://usn.ubuntu.com/3871-5/ Third Party Advisory
https://usn.ubuntu.com/3872-1/ Third Party Advisory
https://usn.ubuntu.com/3878-1/ Third Party Advisory
https://usn.ubuntu.com/3878-2/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2019:4154
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html Mailing List Third Party Advisory
https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039 Third Party Advisory
https://usn.ubuntu.com/3871-1/ Third Party Advisory
https://usn.ubuntu.com/3871-3/ Third Party Advisory
https://usn.ubuntu.com/3871-4/ Third Party Advisory
https://usn.ubuntu.com/3871-5/ Third Party Advisory
https://usn.ubuntu.com/3872-1/ Third Party Advisory
https://usn.ubuntu.com/3878-1/ Third Party Advisory
https://usn.ubuntu.com/3878-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2019:2029 - () https://access.redhat.com/errata/RHSA-2019:2029 -
References () https://access.redhat.com/errata/RHSA-2019:2043 - () https://access.redhat.com/errata/RHSA-2019:2043 -
References () https://access.redhat.com/errata/RHSA-2019:4154 - () https://access.redhat.com/errata/RHSA-2019:4154 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory
References () https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039 - Third Party Advisory () https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039 - Third Party Advisory
References () https://usn.ubuntu.com/3871-1/ - Third Party Advisory () https://usn.ubuntu.com/3871-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-3/ - Third Party Advisory () https://usn.ubuntu.com/3871-3/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-4/ - Third Party Advisory () https://usn.ubuntu.com/3871-4/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-5/ - Third Party Advisory () https://usn.ubuntu.com/3871-5/ - Third Party Advisory
References () https://usn.ubuntu.com/3872-1/ - Third Party Advisory () https://usn.ubuntu.com/3872-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-1/ - Third Party Advisory () https://usn.ubuntu.com/3878-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-2/ - Third Party Advisory () https://usn.ubuntu.com/3878-2/ - Third Party Advisory
CVSS v2 : 4.4
v3 : 7.0
v2 : 4.4
v3 : 5.3

Information

Published : 2018-09-10 13:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14625

Mitre link : CVE-2018-14625

CVE.ORG link : CVE-2018-14625


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')