Oval Definition:oval:com.ubuntu.disco:def:2016107230000000
Revision Date:2018-06-21Version:1
Title:CVE-2016-10723 on Ubuntu 19.04 (disco) - medium.
Description:** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that "the underlying problem is non-trivial to handle."
Family:unixClass:vulnerability
Status:Reference(s):CVE-2016-10723
Platform(s):Ubuntu 19.04
Product(s):
Definition Synopsis
  • Ubuntu 19.04 (disco) is installed.
  • AND Package Information
  • linux package in disco, is related to the CVE in some way and has been fixed (note: '4.19.0-12.13').
  • OR linux-aws package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-kvm package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-meta package in disco, is related to the CVE in some way and has been fixed (note: '4.19.0-12.13').
  • OR linux-meta-aws package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-meta-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-meta-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-meta-kvm package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-meta-oem package in disco is affected and needs fixing.
  • OR linux-meta-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
  • OR linux-meta-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
  • OR linux-meta-raspi2 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1004.4').
  • OR linux-oem package in disco is affected and needs fixing.
  • OR linux-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
  • OR linux-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
  • OR linux-raspi2 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1004.4').
  • OR linux-signed package in disco, is related to the CVE in some way and has been fixed (note: '4.19.0-12.13').
  • OR linux-signed-azure package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-signed-gcp package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1001.1').
  • OR linux-signed-oem package in disco is affected and needs fixing.
  • OR linux-signed-oem-osp1 package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.11').
  • OR linux-signed-oracle package in disco was vulnerable but has been fixed (note: '5.0.0-1004.8').
  • OR linux-snapdragon package in disco, is related to the CVE in some way and has been fixed (note: '5.0.0-1010.10').
  • BACK