Bromium client version 4.0.3.2060 and prior to 4.1.7 Update 1 has an out of bound read results in race condition causing Kernel memory leaks or denial of service.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://support.bromium.com/s/article/Bromium-Secure-Platform-4-1-Update-7-Released | release notes vendor advisory |
https://airbus-cyber-security.com/dive-into-a-kernel-bromium-race-condition-cve-2019-18567 | third party advisory exploit |