A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).
{ "vanir_signatures": [ { "target": { "file": "fs/proc/base.c" }, "signature_type": "Line", "digest": { "line_hashes": [ "91023152750174439985748597211985622076", "41925886234961422753412356272742973556", "13019998461334366749036632332037355883", "41355256773957234660909106351833474082", "257583897312581876868493436995859840844", "132444480576435160263759331892537667748", "44109413692848243930801286822440669462", "200893382321039163417139944985074155409", "309755036132714513222344683200520451256", "149406777921076627978781751802042571893", "44109413692848243930801286822440669462", "200893382321039163417139944985074155409", "3313903375332491854534803418770668334", "252833622459673826103301721919943970396", "305994490275558319593584463590556816238", "46127487502870749232203775972266519014" ], "threshold": 0.9 }, "id": "CVE-2018-1120-12537260", "signature_version": "v1", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@7f7ccc2ccc2e70c6054685f5e3522efa81556830" }, { "target": { "function": "proc_pid_cmdline_read", "file": "fs/proc/base.c" }, "signature_type": "Function", "digest": { "function_hash": "193034114275504349190694178313234783752", "length": 2464.0 }, "id": "CVE-2018-1120-19119e3d", "signature_version": "v1", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@7f7ccc2ccc2e70c6054685f5e3522efa81556830" }, { "target": { "file": "mm/gup.c" }, "signature_type": "Line", "digest": { "line_hashes": [ "141147599891132638395598377925996652407", "240306053835286877736405087885309310552", "200944273451463214954066338370820874857" ], "threshold": 0.9 }, "id": "CVE-2018-1120-3285d334", "signature_version": "v1", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@7f7ccc2ccc2e70c6054685f5e3522efa81556830" }, { "target": { "function": "environ_read", "file": "fs/proc/base.c" }, "signature_type": "Function", "digest": { "function_hash": "7985467531546486341978408478121397245", "length": 991.0 }, "id": "CVE-2018-1120-4b159712", "signature_version": "v1", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@7f7ccc2ccc2e70c6054685f5e3522efa81556830" }, { "target": { "function": "check_vma_flags", "file": "mm/gup.c" }, "signature_type": "Function", "digest": { "function_hash": "169719883223485344833184724559731976094", "length": 573.0 }, "id": "CVE-2018-1120-cc00cf17", "signature_version": "v1", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@7f7ccc2ccc2e70c6054685f5e3522efa81556830" } ] }