The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
References
Link Providers
http://bugzilla.novell.com/show_bug.cgi?id=875690 cve-icon cve-icon
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-0771.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html cve-icon cve-icon
http://pastebin.com/raw.php?i=yTSFUBgZ cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0512.html cve-icon cve-icon
http://secunia.com/advisories/59218 cve-icon cve-icon
http://secunia.com/advisories/59262 cve-icon cve-icon
http://secunia.com/advisories/59599 cve-icon cve-icon
http://source.android.com/security/bulletin/2016-07-01.html cve-icon cve-icon
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2926 cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2928 cve-icon cve-icon
http://www.exploit-db.com/exploits/33516 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2014/05/05/6 cve-icon cve-icon
http://www.osvdb.org/106646 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2196-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2197-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2198-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2199-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2200-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2201-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2202-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2203-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2204-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1094232 cve-icon cve-icon
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-0196 cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-0196 cve-icon
History

Thu, 19 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*

Tue, 13 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2014-05-07T10:00:00

Updated: 2024-08-06T09:05:39.223Z

Reserved: 2013-12-03T00:00:00

Link: CVE-2014-0196

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2014-05-07T10:55:04.337

Modified: 2024-12-19T18:45:22.253

Link: CVE-2014-0196

cve-icon Redhat

Severity : Important

Publid Date: 2014-05-01T00:00:00Z

Links: CVE-2014-0196 - Bugzilla