The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Edge Gateway Subscribe
Big-ip Global Traffic Manager Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Big-ip Protocol Security Module Subscribe
Big-ip Wan Optimization Manager Subscribe
Big-ip Webaccelerator Subscribe
Big-iq Application Delivery Controller Subscribe
Big-iq Centralized Management Subscribe
Big-iq Cloud Subscribe
Big-iq Cloud And Orchestration Subscribe
Big-iq Device Subscribe
Big-iq Security Subscribe
Enterprise Manager Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux Server Eus Subscribe
Enterprise Mrg Subscribe
Rhel Eus Subscribe
Rhel Mission Critical Subscribe
Suse Linux Enterprise Desktop Subscribe
Suse Linux Enterprise High Availability Extension Subscribe
Suse Linux Enterprise Server Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2926-1 linux security update
Debian DSA Debian DSA DSA-2928-1 linux-2.6 security update
Ubuntu USN Ubuntu USN USN-2196-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2197-1 Linux kernel (EC2) vulnerability
Ubuntu USN Ubuntu USN USN-2198-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2199-1 Linux kernel (Quantal HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2200-1 Linux kernel (Raring HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2201-1 Linux kernel (Saucy HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2202-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2203-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2204-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-2227-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2260-1 Linux kernel (Trusty HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://bugzilla.novell.com/show_bug.cgi?id=875690 cve-icon cve-icon
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-0771.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html cve-icon cve-icon
http://pastebin.com/raw.php?i=yTSFUBgZ cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0512.html cve-icon cve-icon
http://secunia.com/advisories/59218 cve-icon cve-icon
http://secunia.com/advisories/59262 cve-icon cve-icon
http://secunia.com/advisories/59599 cve-icon cve-icon
http://source.android.com/security/bulletin/2016-07-01.html cve-icon cve-icon
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2926 cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2928 cve-icon cve-icon
http://www.exploit-db.com/exploits/33516 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2014/05/05/6 cve-icon cve-icon
http://www.osvdb.org/106646 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2196-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2197-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2198-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2199-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2200-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2201-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2202-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2203-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2204-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1094232 cve-icon cve-icon
https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-0196 cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0196 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-0196 cve-icon
History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.61195}

epss

{'score': 0.5836}


Fri, 07 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

kev

{'dateAdded': '2023-05-12'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*

Tue, 13 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-22T00:05:37.666Z

Reserved: 2013-12-03T00:00:00.000Z

Link: CVE-2014-0196

cve-icon Vulnrichment

Updated: 2024-08-06T09:05:39.223Z

cve-icon NVD

Status : Deferred

Published: 2014-05-07T10:55:04.337

Modified: 2025-10-22T01:15:53.760

Link: CVE-2014-0196

cve-icon Redhat

Severity : Important

Publid Date: 2014-05-01T00:00:00Z

Links: CVE-2014-0196 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses