CVE-2014-0196
Published at:
-
07-05-2014 12:55
Last modified:
-
21-09-2022 08:44
Total changes:
-
2
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
6.9
Base score
3.4
10.0
Exploitability score
Impact score
Verification logic
Reference
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption-Mailing List, Third Party Advisory
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- USN-2199-1-Third Party Advisory
- DSA-2928-Third Party Advisory
- SUSE-SU-2014:0683-Mailing List, Third Party Advisory
- USN-2201-1-Third Party Advisory
- RHSA-2014:0512-Third Party Advisory
- DSA-2926-Third Party Advisory
- USN-2202-1-Third Party Advisory
- USN-2196-1-Third Party Advisory
- USN-2198-1-Third Party Advisory
- SUSE-SU-2014:0667-Mailing List, Third Party Advisory
- USN-2204-1-Third Party Advisory
- USN-2197-1-Third Party Advisory
- USN-2200-1-Third Party Advisory
- USN-2203-1-Third Party Advisory
- 59599-Broken Link
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- 59262-Broken Link
- http://source.android.com/security/bulletin/2016-07-01.html
- 106646-Broken Link
- 33516-Exploit, Third Party Advisory, VDB Entry
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- 59218-Not Applicable
Keywords