CVE-2014-0196
CVSS v2.0
6.9 (Medium)
EPSS
1.91 % (89th)
Affected Products
30
Advisories
52
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Weaknesses
- CWE-362
- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Related CVEs
- CVE Status
- PUBLISHED
- CNA
- Red Hat, Inc.
- Published Date
-
2014-05-07 10:55:04
(10 years ago) - Updated Date
-
2024-02-09 19:24:10
(7 months ago)
Linux Kernel Race Condition Vulnerability (CISA - Known Exploited Vulnerabilities Catalog)
- Description
- Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.
- Required Action
- The impacted product is end-of-life and should be disconnected if still in use.
- Known to be Used in Ransomware Campaigns
- Unknown
- Notes
- https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196
- Vendor
- Linux
- Product
- Kernel
- In CISA Catalog from
-
2023-05-12
(16 months ago) - Due Date
-
2023-06-02
(15 months ago)
Affected Products
- Big-ip Access Policy Manager
- Big-ip Advanced Firewall Manager
- Big-ip Analytics
- Big-ip Application Acceleration Manager
- Big-ip Application Security Manager
- Big-ip Edge Gateway
- Big-ip Global Traffic Manager
- Big-ip Link Controller
- Big-ip Local Traffic Manager
- Big-ip Policy Enforcement Manager
- Big-ip Protocol Security Module
- Big-ip Wan Optimization Manager
- Big-ip Webaccelerator
- Big-iq Application Delivery Controller
- Big-iq Centralized Management
- Big-iq Cloud
- Big-iq Cloud And Orchestration
- Big-iq Device
- Big-iq Security
- Enterprise Manager
Loading...
Loading...
Loading...
Configuration #1
|
Configuration #2
|
Configuration #3
|
Configuration #4
|
Configuration #5
|
Configuration #6
|
Configuration #7
|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...