A flaw was found in Linux Kernel in which an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients. Introduced by: https://github.com/torvalds/linux/commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8 References: https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1619847]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2029
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2043
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14625
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:4154 https://access.redhat.com/errata/RHSA-2019:4154