CVE-2014-8171

The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

History

13 Feb 2023, 00:44

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-8171', 'name': 'https://access.redhat.com/security/cve/CVE-2014-8171', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2152', 'name': 'https://access.redhat.com/errata/RHSA-2015:2152', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0864', 'name': 'https://access.redhat.com/errata/RHSA-2015:0864', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:2411', 'name': 'https://access.redhat.com/errata/RHSA-2015:2411', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2016:0068', 'name': 'https://access.redhat.com/errata/RHSA-2016:0068', 'tags': [], 'refsource': 'MISC'}
Summary It was found that the Linux kernel memory resource controller's (memcg) handling of OOM (out of memory) conditions could lead to deadlocks. An attacker able to continuously spawn new processes within a single memory-constrained cgroup during an OOM event could use this flaw to lock up the system. The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup.

02 Feb 2023, 20:19

Type Values Removed Values Added
Summary The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup. It was found that the Linux kernel memory resource controller's (memcg) handling of OOM (out of memory) conditions could lead to deadlocks. An attacker able to continuously spawn new processes within a single memory-constrained cgroup during an OOM event could use this flaw to lock up the system.
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-8171 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2152 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0864 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:2411 -
  • (MISC) https://access.redhat.com/errata/RHSA-2016:0068 -
CPE cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

Information

Published : 2018-02-09 22:29

Updated : 2023-12-10 12:30


NVD link : CVE-2014-8171

Mitre link : CVE-2014-8171

CVE.ORG link : CVE-2014-8171


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux
  • enterprise_mrg
CWE
CWE-399

Resource Management Errors