CVE-2014-0196
CVE Published | 2014-05-07 |
---|---|
Related CWE(s) | CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
Related Vendor(s) | redhat, oracle, suse, linux, canonical, f5, debian |
Related Product(s) | big-ip_policy_enforcement_manager, enterprise_linux_server_eus, suse_linux_enterprise_server, enterprise_manager, big-ip_application_security_manager, big-ip_edge_gateway, suse_linux_enterprise_high_availability_extension, big-ip_link_controller, big-ip_webaccelerator, big-iq_centralized_management, enterprise_linux, big-iq_cloud_and_orchestration, linux, big-iq_cloud, big-ip_access_policy_manager, big-iq_security, big-ip_global_traffic_manager, enterprise_linux_eus, big-iq_application_delivery_controller, big-ip_advanced_firewall_manager, debian_linux, ubuntu_linux, big-ip_wan_optimization_manager, big-iq_device, suse_linux_enterprise_desktop, big-ip_application_acceleration_manager, big-ip_local_traffic_manager, big-ip_analytics, big-ip_protocol_security_module, linux_kernel |
Exploitation Reported (CISA KEV) | 2023-05-12 |
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph