← Volver a CVEs
CVE-2018-14634
N/ACISA KEVDescripcion
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado9/25/2018
Ultima modificacion1/27/2026
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorLinux
ProductoKernel
Nombre vulnerabilidadLinux Kernel Integer Overflow Vulnerability
Fecha inclusion KEV2026-01-26
Fecha limite remediacion2026-02-16
Uso en ransomwareUnknown
Productos afectados
canonical:ubuntu_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:big-iq_cloud_and_orchestrationf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerlinux:linux_kernelnetapp:snapprotectpaloaltonetworks:pan-osredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Debilidades (CWE)
CWE-190CWE-190
Referencias
http://www.openwall.com/lists/oss-security/2021/07/20/2(secalert@redhat.com)
http://www.securityfocus.com/bid/105407(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2748(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2763(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2846(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2924(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2925(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:2933(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3540(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3586(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3590(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3591(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3643(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20190204-0002/(secalert@redhat.com)
https://security.paloaltonetworks.com/CVE-2018-14634(secalert@redhat.com)
https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS(secalert@redhat.com)
https://usn.ubuntu.com/3775-1/(secalert@redhat.com)
https://usn.ubuntu.com/3775-2/(secalert@redhat.com)
https://usn.ubuntu.com/3779-1/(secalert@redhat.com)
https://www.exploit-db.com/exploits/45516/(secalert@redhat.com)
https://www.openwall.com/lists/oss-security/2018/09/25/4(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2021/07/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2763(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2846(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2924(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2925(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2933(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3540(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3586(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3590(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3591(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3643(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K20934447?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3779-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45516/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/25/4(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-14634(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.