5.5
CVSSv3

CVE-2017-18232

Published: 15/03/2018 Updated: 03/10/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Serial Attached SCSI (SAS) implementation in the Linux kernel up to and including 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
Several security issues were fixed in the Linux kernel ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2015-9016 Ming Lei reported a race condition in the multiqueue block layer (blk-mq) On a system with a driver using blk-mq (mtip32xx, null_blk, or virtio_blk), a local user might be able ...
A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_bufferc in the Linux kernel before 539 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3 (CVE-2019-19061) A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmic in the Linux kernel through 53 ...
Missing length check of payload in net/sctp/sm_make_chunkc:_sctp_make_chunk() function allows denial of service:An error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunkc) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS (CVE-2018-5803) Mishandling mutex within libsas allo ...
The Serial Attached SCSI (SAS) implementation in the Linux kernel mishandles a mutex within libsas This allows local users to cause a denial of service (deadlock) by triggering certain error-handling code ...