CVE-2014-0196

medium F5 ⚠️ CISA KEV — Exploited in the Wild
CVSS v3 Base Score
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS Score
48.6%
Exploitation probability in 30 days
Top 2% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
None
Integrity
None
Availability
High
Published: May 7, 2014 (4390 days ago)
Last Modified: April 21, 2026
Vendor: F5
Source: NVD

⚠️ CISA Known Exploited Vulnerability

Added to KEV: 2023-05-12
Remediation Due: 2023-06-02 (⚠ 1077d overdue)

Description

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CWE

CWE-362

Affected Products

linux linux kerneldebian debian linuxredhat enterprise linuxredhat enterprise linux eusredhat enterprise linux server eussuse suse linux enterprise desktopsuse suse linux enterprise high availability extensionsuse suse linux enterprise serveroracle linuxcanonical ubuntu linux

References