Vulnerability Details : CVE-2014-8173
The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-8173
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-8173
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2014-8173
-
http://rhn.redhat.com/errata/RHSA-2015-0694.html
RHSA-2015:0694 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1198457
1198457 – (CVE-2014-8173) CVE-2014-8173 kernel: NULL pointer dereference in madvise(MADV_WILLNEED) supportIssue Tracking
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee53664bda169f519ce3c6a22d378f0b946c8178
Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
[security-announce] openSUSE-SU-2015:0714-1: important: Security updateThird Party Advisory
-
https://github.com/torvalds/linux/commit/ee53664bda169f519ce3c6a22d378f0b946c8178
mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support · torvalds/linux@ee53664 · GitHubThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0290.html
RHSA-2015:0290 - Security Advisory - Red Hat Customer PortalThird Party Advisory;VDB Entry
Products affected by CVE-2014-8173
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*