CVE-2014-0196

CVE Published 2014-05-07
Related CWE(s) CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Related Vendor(s) redhat, oracle, suse, linux, canonical, f5, debian
Related Product(s) big-ip_policy_enforcement_manager, enterprise_linux_server_eus, suse_linux_enterprise_server, enterprise_manager, big-ip_application_security_manager, big-ip_edge_gateway, suse_linux_enterprise_high_availability_extension, big-ip_link_controller, big-ip_webaccelerator, big-iq_centralized_management, enterprise_linux, big-iq_cloud_and_orchestration, linux, big-iq_cloud, big-ip_access_policy_manager, big-iq_security, big-ip_global_traffic_manager, enterprise_linux_eus, big-iq_application_delivery_controller, big-ip_advanced_firewall_manager, debian_linux, ubuntu_linux, big-ip_wan_optimization_manager, big-iq_device, suse_linux_enterprise_desktop, big-ip_application_acceleration_manager, big-ip_local_traffic_manager, big-ip_analytics, big-ip_protocol_security_module, linux_kernel
Exploitation Reported (CISA KEV) 2023-05-12

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Associated CAPEC Patterns

References