The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Information
Published : 2014-05-07 03:55
Updated : 2023-02-12 16:36
NVD link : CVE-2014-0196
Mitre link : CVE-2014-0196
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
suse
- suse_linux_enterprise_high_availability_extension
- suse_linux_enterprise_desktop
- suse_linux_enterprise_server
f5
- big-ip_edge_gateway
- big-ip_webaccelerator
- big-iq_cloud_and_orchestration
- big-ip_application_security_manager
- big-ip_wan_optimization_manager
- big-ip_global_traffic_manager
- big-ip_link_controller
- big-ip_protocol_security_module
- big-iq_cloud
- big-iq_security
- enterprise_manager
- big-ip_advanced_firewall_manager
- big-iq_device
- big-ip_access_policy_manager
- big-iq_centralized_management
- big-iq_application_delivery_controller
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_analytics
- big-ip_policy_enforcement_manager
canonical
- ubuntu_linux
linux
- linux_kernel
redhat
- enterprise_linux
- enterprise_linux_server_eus
- enterprise_linux_eus
debian
- debian_linux
oracle
- linux