5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.1%
A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
[
{
"product": "kernel",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
]
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/errata/RHSA-2019:4154
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625
lists.debian.org/debian-lts-announce/2019/05/msg00002.html
syzkaller.appspot.com/bug?extid=bd391451452fb0b93039
usn.ubuntu.com/3871-1/
usn.ubuntu.com/3871-3/
usn.ubuntu.com/3871-4/
usn.ubuntu.com/3871-5/
usn.ubuntu.com/3872-1/
usn.ubuntu.com/3878-1/
usn.ubuntu.com/3878-2/
5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.1%