Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0196

Опубликовано: 01 мая 2014
Источник: redhat
CVSS2: 6.9

Описание

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

Отчет

This issue did not affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This issue affected the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 prior to version kernel-2.6.32-358.6.1.el6, released via RHSA-2013:0744 (https://rhn.redhat.com/errata/RHSA-2013-0744.html). That update added a backport of the upstream commit c56a00a165, which avoided this issue. This flaw requires local system access to be exploited. We are currently not aware of any working exploit for Red Hat Enterprise Linux 6 or Red Hat Enterprise MRG 2.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2013:074423.04.2013
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:052020.05.2014
Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node OnlykernelFixedRHSA-2014:051219.05.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:067810.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:055727.05.2014

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1094232kernel: pty layer race condition leading to memory corruption

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
nvd
больше 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
debian
больше 11 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel th ...

CVSS3: 5.5
github
больше 3 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

oracle-oval
около 11 лет назад

ELSA-2014-0678: kernel security update (IMPORTANT)

6.9 Medium

CVSS2