Description
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Published: 2014-05-07
Score: 5.5 Medium
EPSS: 48.6% Moderate
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2926-1 linux security update
Debian DSA Debian DSA DSA-2928-1 linux-2.6 security update
Ubuntu USN Ubuntu USN USN-2196-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2197-1 Linux kernel (EC2) vulnerability
Ubuntu USN Ubuntu USN USN-2198-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2199-1 Linux kernel (Quantal HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2200-1 Linux kernel (Raring HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2201-1 Linux kernel (Saucy HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2202-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2203-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2204-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2227-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2260-1 Linux kernel (Trusty HWE) vulnerabilities
References
Link Providers
http://bugzilla.novell.com/show_bug.cgi?id=875690 cve-icon cve-icon
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-0771.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html cve-icon cve-icon
http://pastebin.com/raw.php?i=yTSFUBgZ cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0512.html cve-icon cve-icon
http://secunia.com/advisories/59218 cve-icon cve-icon
http://secunia.com/advisories/59262 cve-icon cve-icon
http://secunia.com/advisories/59599 cve-icon cve-icon
http://source.android.com/security/bulletin/2016-07-01.html cve-icon cve-icon
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2926 cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2928 cve-icon cve-icon
http://www.exploit-db.com/exploits/33516 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2014/05/05/6 cve-icon cve-icon
http://www.osvdb.org/106646 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2196-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2197-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2198-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2199-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2200-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2201-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2202-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2203-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2204-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1094232 cve-icon cve-icon
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-0196 cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0196 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-0196 cve-icon
History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.61195}

epss

{'score': 0.5836}


Fri, 07 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

kev

{'dateAdded': '2023-05-12'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*

Tue, 13 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
References

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Edge Gateway Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Protocol Security Module Big-ip Wan Optimization Manager Big-ip Webaccelerator Big-iq Application Delivery Controller Big-iq Centralized Management Big-iq Cloud Big-iq Cloud And Orchestration Big-iq Device Big-iq Security Enterprise Manager
Linux Linux Kernel
Oracle Linux
Redhat Enterprise Linux Enterprise Linux Eus Enterprise Linux Server Eus Enterprise Mrg Rhel Eus Rhel Mission Critical
Suse Suse Linux Enterprise Desktop Suse Linux Enterprise High Availability Extension Suse Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-22T00:05:37.666Z

Reserved: 2013-12-03T00:00:00.000Z

Link: CVE-2014-0196

cve-icon Vulnrichment

Updated: 2024-08-06T09:05:39.223Z

cve-icon NVD

Status : Deferred

Published: 2014-05-07T10:55:04.337

Modified: 2025-10-22T01:15:53.760

Link: CVE-2014-0196

cve-icon Redhat

Severity : Important

Publid Date: 2014-05-01T00:00:00Z

Links: CVE-2014-0196 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses