Vulnerability Name: | CVE-2016-10723 | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-06-21 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-06-21 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-08-21 | ||||||||||||||||||||||||||||||||||||||||
Summary: | ** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. Note: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that "the underlying problem is non-trivial to handle." | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-10723 Source: MISC Type: Issue Tracking, Vendor Advisory https://patchwork.kernel.org/patch/10395909/ Source: MISC Type: Issue Tracking, Vendor Advisory https://patchwork.kernel.org/patch/9842889/ Source: MISC Type: Mailing List, Third Party Advisory https://www.spinics.net/lists/linux-mm/msg117896.html | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |