CVE-2014-0196
| CVE Published | 2014-05-07 |
|---|---|
| Related CWE(s) | CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| Related Vendor(s) | canonical, f5, oracle, suse, debian, linux, redhat |
| Related Product(s) | big-iq_centralized_management, big-iq_cloud_and_orchestration, big-ip_protocol_security_module, big-ip_webaccelerator, debian_linux, big-ip_advanced_firewall_manager, big-iq_device, big-ip_global_traffic_manager, enterprise_linux_eus, suse_linux_enterprise_server, suse_linux_enterprise_high_availability_extension, enterprise_linux_server_eus, enterprise_manager, big-iq_cloud, big-ip_analytics, ubuntu_linux, big-iq_application_delivery_controller, big-ip_application_security_manager, linux_kernel, big-ip_link_controller, enterprise_linux, big-ip_access_policy_manager, linux, big-ip_local_traffic_manager, suse_linux_enterprise_desktop, big-ip_edge_gateway, big-iq_security, big-ip_wan_optimization_manager, big-ip_policy_enforcement_manager, big-ip_application_acceleration_manager |
| Exploitation Reported (CISA KEV) | 2023-05-12 |
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph