<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2014-8173</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2014-8173</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>20</Number>
        <Date>2025-05-18T00:11:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T13:23:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-18T00:11:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2014-8173</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0714-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Liberty Linux 7">
      <Branch Type="Product Name" Name="SUSE Liberty Linux 7">
        <FullProductName ProductID="SUSE Liberty Linux 7" CPE="cpe:/o:suse:sll:7">SUSE Liberty Linux 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL" CPE="cpe:/o:suse:sles-bcl:12:sp2">SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-3.10.0-229.el7">
      <FullProductName ProductID="kernel-3.10.0-229.el7">kernel-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-abi-whitelists-3.10.0-229.el7">
      <FullProductName ProductID="kernel-abi-whitelists-3.10.0-229.el7">kernel-abi-whitelists-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-3.10.0-229.el7">
      <FullProductName ProductID="kernel-debug-3.10.0-229.el7" CPE="cpe:2.3:a:linux:linux_kernel:3.10.0:*:*:*:*:*:*:*">kernel-debug-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-3.10.0-229.el7">
      <FullProductName ProductID="kernel-debug-devel-3.10.0-229.el7">kernel-debug-devel-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default">
      <FullProductName ProductID="kernel-default" CPE="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*">kernel-default</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base">
      <FullProductName ProductID="kernel-default-base" CPE="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*">kernel-default-base</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel">
      <FullProductName ProductID="kernel-default-devel">kernel-default-devel</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel">
      <FullProductName ProductID="kernel-devel" CPE="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*">kernel-devel</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-3.10.0-229.el7">
      <FullProductName ProductID="kernel-devel-3.10.0-229.el7" CPE="cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:*:*">kernel-devel-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-doc-3.10.0-229.el7">
      <FullProductName ProductID="kernel-doc-3.10.0-229.el7">kernel-doc-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-headers-3.10.0-229.el7">
      <FullProductName ProductID="kernel-headers-3.10.0-229.el7">kernel-headers-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros">
      <FullProductName ProductID="kernel-macros">kernel-macros</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source">
      <FullProductName ProductID="kernel-source" CPE="cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*">kernel-source</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-tools-3.10.0-229.el7">
      <FullProductName ProductID="kernel-tools-3.10.0-229.el7">kernel-tools-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-tools-libs-3.10.0-229.el7">
      <FullProductName ProductID="kernel-tools-libs-3.10.0-229.el7">kernel-tools-libs-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-tools-libs-devel-3.10.0-229.el7">
      <FullProductName ProductID="kernel-tools-libs-devel-3.10.0-229.el7">kernel-tools-libs-devel-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perf-3.10.0-229.el7">
      <FullProductName ProductID="perf-3.10.0-229.el7">perf-3.10.0-229.el7</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-perf-3.10.0-229.el7">
      <FullProductName ProductID="python-perf-3.10.0-229.el7">python-perf-3.10.0-229.el7</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-3.10.0-229.el7">kernel-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-abi-whitelists-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-abi-whitelists-3.10.0-229.el7">kernel-abi-whitelists-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-debug-3.10.0-229.el7">kernel-debug-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-debug-devel-3.10.0-229.el7">kernel-debug-devel-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-devel-3.10.0-229.el7">kernel-devel-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-doc-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-doc-3.10.0-229.el7">kernel-doc-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-headers-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-headers-3.10.0-229.el7">kernel-headers-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-tools-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-tools-3.10.0-229.el7">kernel-tools-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-tools-libs-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-tools-libs-3.10.0-229.el7">kernel-tools-libs-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-tools-libs-devel-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:kernel-tools-libs-devel-3.10.0-229.el7">kernel-tools-libs-devel-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="perf-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:perf-3.10.0-229.el7">perf-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-perf-3.10.0-229.el7" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 7">
      <FullProductName ProductID="SUSE Liberty Linux 7:python-perf-3.10.0-229.el7">python-perf-3.10.0-229.el7 as a component of SUSE Liberty Linux 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default">kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base">kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel">kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel">kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros">kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source">kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.</Note>
    </Notes>
    <CVE>CVE-2014-8173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Liberty Linux 7:kernel-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-abi-whitelists-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-debug-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-debug-devel-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-devel-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-doc-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-headers-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-tools-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-tools-libs-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:kernel-tools-libs-devel-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:perf-3.10.0-229.el7</ProductID>
        <ProductID>SUSE Liberty Linux 7:python-perf-3.10.0-229.el7</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.2</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
