CVE-2018-1120
Summary
| CVE | CVE-2018-1120 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-20 13:29:00 UTC |
| Updated | 2019-10-09 23:38:00 UTC |
| Description | A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks). |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| USN-3752-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| kernel/git/torvalds/linux.git - Linux kernel source tree |
CONFIRM |
git.kernel.org |
Patch, Third Party Advisory |
| USN-3752-2: Linux kernel (HWE) vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| [SECURITY] [DLA 1423-1] linux-4.9 new package |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| oss-sec: Qualys Security Advisory - Procps-ng Audit Report |
MLIST |
seclists.org |
Exploit, Mailing List, Third Party Advisory |
| Procps-ng - Multiple Vulnerabilities - Linux local Exploit |
EXPLOIT-DB |
www.exploit-db.com |
Exploit, Third Party Advisory, VDB Entry |
| procps: Multiple vulnerabilities (GLSA 201805-14) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| USN-3752-3: Linux kernel (Azure, GCP, OEM) vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| 1575472 – (CVE-2018-1120) CVE-2018-1120 kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| USN-3910-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
|
| Linux Kernel CVE-2018-1120 Local Denial of Service Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| USN-3910-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 376119 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) Linux Kernel Vulnerability (K42202505)