TROYANOSYVIRUS
Volver a CVEs

CVE-2018-14634

N/ACISA KEV

Descripcion

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado9/25/2018
Ultima modificacion1/27/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorLinux
ProductoKernel
Nombre vulnerabilidadLinux Kernel Integer Overflow Vulnerability
Fecha inclusion KEV2026-01-26
Fecha limite remediacion2026-02-16
Uso en ransomwareUnknown

Productos afectados

canonical:ubuntu_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:big-iq_cloud_and_orchestrationf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerlinux:linux_kernelnetapp:snapprotectpaloaltonetworks:pan-osredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation

Debilidades (CWE)

CWE-190CWE-190

Referencias

https://usn.ubuntu.com/3775-1/(secalert@redhat.com)
https://usn.ubuntu.com/3775-2/(secalert@redhat.com)
https://usn.ubuntu.com/3779-1/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2021/07/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2763(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2846(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2924(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2925(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2933(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3540(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3586(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3590(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3591(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3643(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3779-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45516/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/25/4(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.