Overview
Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.
https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2014-0196 |
| Vendor / Product | Linux — Kernel |
| NVD Published | 2014-05-07 |
| NVD Last Modified | 2025-10-22 |
| CVSS 3.1 Score | 5.5 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Severity | MEDIUM |
| CWE | CWE-362 |
| CISA KEV Added | 2023-05-12 |
| CISA KEV Deadline | 2023-06-02 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2023-06-02.
The impacted product is end-of-life and should be disconnected if still in use.
Timeline
| Date | Event |
|---|---|
| 2023-05-12 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2023-06-02 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2014-0196 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |