A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
4.15.0-1037.39~14.04.24.15.0-1032.34~16.04.14.15.0-1037.39~16.04.14.15.0-1027.28~16.04.14.15.0-45.48~16.04.14.15.0-1008.10~16.04.14.15.0-44.474.15.0-1032.344.15.0-1037.394.15.0-1027.28Exploitability
AV:LAC:HPR:LUI:NScope
S:UImpact
C:HI:HA:HCVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H