CVE-2018-14634

EUVD-2018-6537
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
paloaltonetworkspan-os
7.1.0 ≤
𝑥
< 7.1.23
paloaltonetworkspan-os
8.0.0 ≤
𝑥
< 8.0.16
paloaltonetworkspan-os
8.1.0 ≤
𝑥
< 8.1.7
f5big-ip_access_policy_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_access_policy_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_access_policy_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_access_policy_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_access_policy_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_advanced_firewall_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_advanced_firewall_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_advanced_firewall_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_advanced_firewall_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_advanced_firewall_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_analytics
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_analytics
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_analytics
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_analytics
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_analytics
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_application_acceleration_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_application_acceleration_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_application_acceleration_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_application_acceleration_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_application_acceleration_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_application_security_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_application_security_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_application_security_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_application_security_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_application_security_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_domain_name_system
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_domain_name_system
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_domain_name_system
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_domain_name_system
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_domain_name_system
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_edge_gateway
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_edge_gateway
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_edge_gateway
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_edge_gateway
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_edge_gateway
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_fraud_protection_service
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_fraud_protection_service
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_fraud_protection_service
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_fraud_protection_service
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_fraud_protection_service
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_global_traffic_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_global_traffic_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_global_traffic_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_global_traffic_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_global_traffic_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_link_controller
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_link_controller
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_link_controller
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_link_controller
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_link_controller
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_local_traffic_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_local_traffic_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_local_traffic_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_local_traffic_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_local_traffic_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_policy_enforcement_manager
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_policy_enforcement_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_policy_enforcement_manager
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_policy_enforcement_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_policy_enforcement_manager
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-ip_webaccelerator
11.2.1 ≤
𝑥
< 11.6.4
f5big-ip_webaccelerator
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_webaccelerator
13.0.0 ≤
𝑥
< 13.1.1.5
f5big-ip_webaccelerator
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_webaccelerator
14.1.0 ≤
𝑥
< 14.1.0.6
f5big-iq_centralized_management
5.0.0 ≤
𝑥
≤ 5.4.0
f5big-iq_centralized_management
6.0.0 ≤
𝑥
≤ 6.0.1
f5big-iq_centralized_management
7.0.0 ≤
𝑥
≤ 7.1.0
f5big-iq_centralized_management
4.6.0
f5big-iq_cloud_and_orchestration
1.0.0
f5enterprise_manager
3.1.1
f5iworkflow
2.2.0 ≤
𝑥
≤ 2.3.0
f5traffix_signaling_delivery_controller
5.0.0 ≤
𝑥
≤ 5.1.0
f5traffix_signaling_delivery_controller
4.4.0
linuxlinux_kernel
2.6.0 ≤
𝑥
≤ 2.6.39.4
linuxlinux_kernel
3.10 ≤
𝑥
≤ 3.10.102
linuxlinux_kernel
4.14 ≤
𝑥
≤ 4.14.54
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
6.5
redhatenterprise_linux_server_aus
6.6
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_eus
6.7
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_tus
6.6
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
netappsnapprotect
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.106-3
fixed
bookworm (security)
6.1.112-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.226-1
fixed
sid
6.11.5-1
fixed
trixie
6.11.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
bionic
not-affected
cosmic
not-affected
trusty
Fixed 3.13.0-160.210
released
xenial
Fixed 4.4.0-93.116
released
linux-aws
bionic
not-affected
cosmic
not-affected
trusty
not-affected
xenial
Fixed 4.4.0-1032.41
released
linux-azure
bionic
not-affected
cosmic
not-affected
trusty
not-affected
xenial
not-affected
linux-azure-edge
bionic
not-affected
cosmic
dne
trusty
dne
xenial
not-affected
linux-euclid
bionic
dne
cosmic
dne
trusty
dne
xenial
Fixed 4.4.0-9029.31
released
linux-flo
bionic
dne
cosmic
dne
trusty
dne
xenial
ignored
linux-gcp
bionic
not-affected
cosmic
not-affected
trusty
dne
xenial
Fixed 4.13.0-1002.5
released
linux-gke
bionic
dne
cosmic
dne
trusty
dne
xenial
ignored
linux-goldfish
bionic
dne
cosmic
dne
trusty
dne
xenial
ignored
linux-grouper
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-hwe
bionic
not-affected
cosmic
dne
trusty
dne
xenial
Fixed 4.13.0-26.29~16.04.2
released
linux-hwe-edge
bionic
not-affected
cosmic
dne
trusty
dne
xenial
Fixed 4.13.0-26.29~16.04.2
released
linux-kvm
bionic
not-affected
cosmic
not-affected
trusty
dne
xenial
Fixed 4.4.0-1007.12
released
linux-lts-trusty
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-lts-utopic
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-lts-vivid
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-lts-wily
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-lts-xenial
bionic
dne
cosmic
dne
trusty
Fixed 4.4.0-93.116~14.04.1
released
xenial
dne
linux-maguro
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-mako
bionic
dne
cosmic
dne
trusty
dne
xenial
ignored
linux-manta
bionic
dne
cosmic
dne
trusty
dne
xenial
dne
linux-oem
bionic
not-affected
cosmic
not-affected
trusty
dne
xenial
not-affected
linux-raspi2
bionic
not-affected
cosmic
not-affected
trusty
dne
xenial
Fixed 4.4.0-1071.79
released
linux-snapdragon
bionic
not-affected
cosmic
dne
trusty
dne
xenial
Fixed 4.4.0-1073.78
released
References