Description
The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4187-1 | linux security update |
EUVD |
EUVD-2017-9364 | The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. |
Ubuntu USN |
USN-4163-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4163-2 | Linux kernel (Xenial HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:13:49.098Z
Reserved: 2018-03-14T00:00:00.000Z
Link: CVE-2017-18232
No data.
Status : Modified
Published: 2018-03-15T04:29:00.227
Modified: 2024-11-21T03:19:38.010
Link: CVE-2017-18232
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN