The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4187-1 | linux security update |
EUVD |
EUVD-2017-9364 | The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. |
Ubuntu USN |
USN-4163-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4163-2 | Linux kernel (Xenial HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:13:49.098Z
Reserved: 2018-03-14T00:00:00
Link: CVE-2017-18232
No data.
Status : Modified
Published: 2018-03-15T04:29:00.227
Modified: 2024-11-21T03:19:38.010
Link: CVE-2017-18232
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN