Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:3083 | third party advisory vendor advisory |
https://usn.ubuntu.com/3762-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2018:2948 | third party advisory vendor advisory |
https://usn.ubuntu.com/3762-2/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3096 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118 | issue tracking third party advisory |