A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
An upstream patch:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1629942]
This is fixed for Fedora with the 4.18.6 stable updates.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):