CVE-2014-0196

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1094232 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/05/6 Mailing List Third Party Advisory
http://bugzilla.novell.com/show_bug.cgi?id=875690 Permissions Required Third Party Advisory
http://pastebin.com/raw.php?i=yTSFUBgZ Exploit Mailing List Third Party Advisory
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 Exploit Patch Third Party Advisory
http://www.ubuntu.com/usn/USN-2199-1 Third Party Advisory
http://www.debian.org/security/2014/dsa-2928 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-2201-1 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0512.html Third Party Advisory
http://www.debian.org/security/2014/dsa-2926 Third Party Advisory
http://www.ubuntu.com/usn/USN-2202-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2196-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2198-1 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-2204-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2197-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2200-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2203-1 Third Party Advisory
http://secunia.com/advisories/59599 Broken Link
http://linux.oracle.com/errata/ELSA-2014-0771.html Third Party Advisory
http://secunia.com/advisories/59262 Broken Link
http://source.android.com/security/bulletin/2016-07-01.html Not Applicable
http://www.osvdb.org/106646 Broken Link
http://www.exploit-db.com/exploits/33516 Exploit Third Party Advisory VDB Entry
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html Third Party Advisory
http://secunia.com/advisories/59218 Not Applicable
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:suse_linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:f5:big-iq_application_delivery_controller:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

Information

Published : 2014-05-07 03:55

Updated : 2023-02-12 16:36


NVD link : CVE-2014-0196

Mitre link : CVE-2014-0196


JSON object : View

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Advertisement

dedicated server usa

Products Affected

suse

  • suse_linux_enterprise_high_availability_extension
  • suse_linux_enterprise_desktop
  • suse_linux_enterprise_server

f5

  • big-ip_edge_gateway
  • big-ip_webaccelerator
  • big-iq_cloud_and_orchestration
  • big-ip_application_security_manager
  • big-ip_wan_optimization_manager
  • big-ip_global_traffic_manager
  • big-ip_link_controller
  • big-ip_protocol_security_module
  • big-iq_cloud
  • big-iq_security
  • enterprise_manager
  • big-ip_advanced_firewall_manager
  • big-iq_device
  • big-ip_access_policy_manager
  • big-iq_centralized_management
  • big-iq_application_delivery_controller
  • big-ip_local_traffic_manager
  • big-ip_application_acceleration_manager
  • big-ip_analytics
  • big-ip_policy_enforcement_manager

canonical

  • ubuntu_linux

linux

  • linux_kernel

redhat

  • enterprise_linux
  • enterprise_linux_server_eus
  • enterprise_linux_eus

debian

  • debian_linux

oracle

  • linux