Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0196

Опубликовано: 07 мая 2014
Источник: debian
EPSS Средний

Описание

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.14.4-1package
linux-2.6removedpackage

Примечания

  • PoC: http://pastebin.com/yTSFUBgZ

EPSS

Процентиль: 98%
0.60264
Средний

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

redhat
около 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
nvd
около 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
github
около 3 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

oracle-oval
почти 11 лет назад

ELSA-2014-0678: kernel security update (IMPORTANT)

EPSS

Процентиль: 98%
0.60264
Средний