CVE-2014-0196
Published: 5 May 2014
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
From the Ubuntu security team
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An unprivileged user could exploit this flaw to cause a denial of service (system crash) or potentially gain administrator privileges.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc5)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 13.10 preview kernels android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196
- https://ubuntu.com/security/notices/USN-2196-1
- https://ubuntu.com/security/notices/USN-2197-1
- https://ubuntu.com/security/notices/USN-2198-1
- https://ubuntu.com/security/notices/USN-2199-1
- https://ubuntu.com/security/notices/USN-2200-1
- https://ubuntu.com/security/notices/USN-2201-1
- https://ubuntu.com/security/notices/USN-2202-1
- https://ubuntu.com/security/notices/USN-2203-1
- https://ubuntu.com/security/notices/USN-2204-1
- https://ubuntu.com/security/notices/USN-2227-1
- https://ubuntu.com/security/notices/USN-2260-1
- NVD
- Launchpad
- Debian