TROYANOSYVIRUS
Retour aux CVEs

CVE-2018-14634

N/ACISA KEV

Description

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.

Details CVE

Score CVSS v3.1N/A
Publie9/25/2018
Derniere modification1/27/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurLinux
ProduitKernel
Nom vulnerabiliteLinux Kernel Integer Overflow Vulnerability
Date ajout KEV2026-01-26
Date limite remediation2026-02-16
Utilise dans ransomwareUnknown

Produits affectes

canonical:ubuntu_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:big-iq_cloud_and_orchestrationf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerlinux:linux_kernelnetapp:snapprotectpaloaltonetworks:pan-osredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation

Faiblesses (CWE)

CWE-190CWE-190

References

https://usn.ubuntu.com/3775-1/(secalert@redhat.com)
https://usn.ubuntu.com/3775-2/(secalert@redhat.com)
https://usn.ubuntu.com/3779-1/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2021/07/20/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/105407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2748(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2763(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2846(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2924(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2925(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2933(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3540(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3586(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3590(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3591(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3643(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190204-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.paloaltonetworks.com/CVE-2018-14634(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3775-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3779-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45516/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2018/09/25/4(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.