#VU13470 Race condition in Linux kernel - CVE-2018-12633
Published: June 25, 2018 / Updated: June 26, 2018
Linux kernel
Linux Foundation
Description
The vulnerability allows a local attacker to obtain potentially sensitive information or cause DoS condition on the target system.
The vulnerability exists due to race condition when the vbg_misc_device_ioctl() function, as defined in the drivers/virt/vboxguest/vboxguest_linux.c source code file, allows user data to be read twice with the copy_from_userfunction. A local attacker can trigger a race condition, modify critical variables as hdr.size_in and hdr.size_out in the header, trigger a buffer over-access condition and access sensitive information or cause the system to crash.