CVE-2014-0196

CVE Published 2014-05-07
Related CWE(s) CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Related Vendor(s) oracle, debian, redhat, f5, linux, suse, canonical
Related Product(s) big-iq_cloud, big-ip_local_traffic_manager, big-ip_link_controller, enterprise_linux_eus, big-ip_access_policy_manager, big-ip_policy_enforcement_manager, big-ip_edge_gateway, ubuntu_linux, big-ip_application_security_manager, big-iq_cloud_and_orchestration, big-ip_global_traffic_manager, big-ip_analytics, big-ip_application_acceleration_manager, linux_kernel, big-ip_advanced_firewall_manager, big-iq_application_delivery_controller, linux, suse_linux_enterprise_high_availability_extension, suse_linux_enterprise_server, enterprise_linux, big-iq_device, big-ip_protocol_security_module, big-iq_centralized_management, big-ip_webaccelerator, big-ip_wan_optimization_manager, enterprise_linux_server_eus, suse_linux_enterprise_desktop, enterprise_manager, big-iq_security, debian_linux
Exploitation Reported (CISA KEV) 2023-05-12

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Associated CAPEC Patterns

References