ID

VAR-201809-0668


CVE

CVE-2018-14634


TITLE

Linux kernel Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201809-1129

DESCRIPTION

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable. 7) - noarch, ppc64le 3. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3588731 4. Consequently, the node was not available. This update fixes some scheduling latency sources in memory compaction and in the inodes memory reclaim. (BZ#1635794) 4. 6.4) - x86_64 3. 6.7) - i386, ppc64, s390x, x86_64 3. Bug Fix(es): * Previously, the kernel source code lacked support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected". This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)", where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1615873) * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. (BZ#1629634) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:3590-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:3590 Issue date: 2018-11-13 CVE Names: CVE-2017-18344 CVE-2018-5391 CVE-2018-10675 CVE-2018-14634 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634. Bug Fix(es): * Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629565) * Previously, a packet was missing the User Datagram Protocol (UDP) payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635792) * Previously, a transform lookup through the xfrm framework could be performed on an already transformed destination cache entry (dst_entry). When using User Datagram Protocol (UDP) over IPv6 with a connected socket in conjunction with Internet Protocol Security (IPsec) in Encapsulating Security Payload (ESP) transport mode. As a consequence, invalid IPv6 fragments transmitted from the host or the kernel occasionally terminated unexpectedly due to a socket buffer (SKB) underrun. With this update, the xfrm lookup on an already transformed dst_entry is not possible. As a result, using UDP iperf utility over IPv6 ESP no longer causes invalid IPv6 fragment transmissions or a kernel panic. (BZ#1639586) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) 1610958 - CVE-2017-18344 kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.2): Source: kernel-3.10.0-327.76.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.76.1.el7.noarch.rpm kernel-doc-3.10.0-327.76.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-headers-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.76.1.el7.x86_64.rpm perf-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.2): Source: kernel-3.10.0-327.76.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.76.1.el7.noarch.rpm kernel-doc-3.10.0-327.76.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-headers-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.76.1.el7.x86_64.rpm perf-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.2): Source: kernel-3.10.0-327.76.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.76.1.el7.noarch.rpm kernel-doc-3.10.0-327.76.1.el7.noarch.rpm x86_64: kernel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-devel-3.10.0-327.76.1.el7.x86_64.rpm kernel-headers-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.76.1.el7.x86_64.rpm perf-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.76.1.el7.x86_64.rpm perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.76.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-18344 https://access.redhat.com/security/cve/CVE-2018-5391 https://access.redhat.com/security/cve/CVE-2018-10675 https://access.redhat.com/security/cve/CVE-2018-14634 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/3553061 https://access.redhat.com/security/vulnerabilities/mutagen-astronomy 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW+sPDtzjgjWX9erEAQhm3BAAhxwzb8zJTfl0zFY/r9KUzkAdLXY4w39X BgJrVPyl7f6krvQ17HE95Poqz/iUhMOZAweypQXHMRKkmfMTYiLHlKpdIusou2xy y1ZzB1uloI4j2zMdTDRP5yZz06r/NP5A05pLZDA02iR5b07ALLYb5hcL5oBnpQXp 9Xp31qb7TCP+jWtCO1Ot+9GJ3chMNvpYqH0OkGTpq/G7PxGrhIzB6v4p6N5OntD9 5CIebREaGBWn9ViWiUHcthgg+PN2iS2/5ST82g/Jss/WmVVZSiVbayob6/MNQPnb M29VHOmJ6pf5dERNpSqrJrBXeDYCMA6HHD+RT9SmiuQQ8gQ2Rzjy7K97Nn++6x7O nclOTmB7hQZtl0WhgC3xuwtslXGpe9jKSzql03ijTvJRQrczgVWiBS+tpfVAJprV ma2Kchf5ivctaXZ/R62JMyTvNf6HCVdvBNvSNET52ol3PkdpJK7V7mg+H64Mqdrl cBTUDBHHYYWMJted9pHWq7tPs0vy1h9aoFqNdlak5jwr169vldlZMRBbhtvz+OXj V/o+IClbY9UUfibaXDoX7qufeVikW1KQ4L+VhRj3RzXNsu2A8FUAcN7za5Qv5HIe LiC42C+pjvHqS/9gNpBakzKv6nPldWZIfPEuF4zewizBxlTXHPE1ln1hAWKjqVTs 6QJ1Zh7jeUY= =8JOQ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-3775-2 October 01, 2018 linux-lts-trusty vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. It was discovered that the paravirtualization implementation in the Linux kernel did not properly handle some indirect calls, reducing the effectiveness of Spectre v2 mitigations for paravirtual guests. A local attacker could use this to expose sensitive information. (CVE-2018-15594) It was discovered that microprocessors utilizing speculative execution and prediction of return addresses via Return Stack Buffer (RSB) may allow unauthorized memory reads via sidechannel attacks. An attacker could use this to expose sensitive information. A local attacker could use this to gain administrative privileges. (CVE-2018-14634) It was discovered that a stack-based buffer overflow existed in the iSCSI target implementation of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash). (CVE-2018-14633) It was discovered that a memory leak existed in the IRDA subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (kernel memory exhaustion). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-6555) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: linux-image-3.13.0-160-generic 3.13.0-160.210~precise1 linux-image-3.13.0-160-generic-lpae 3.13.0-160.210~precise1 linux-image-generic-lpae-lts-trusty 3.13.0.160.150 linux-image-generic-lts-trusty 3.13.0.160.150 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Trust: 1.71

sources: NVD: CVE-2018-14634 // VULMON: CVE-2018-14634 // PACKETSTORM: 149539 // PACKETSTORM: 150317 // PACKETSTORM: 150416 // PACKETSTORM: 149633 // PACKETSTORM: 149832 // PACKETSTORM: 150315 // PACKETSTORM: 149641 // PACKETSTORM: 149634

AFFECTED PRODUCTS

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:gteversion:7.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:13.1.1.5

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:2.6.39.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.2.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.14

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:iworkflowscope:gteversion:2.2.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:lteversion:5.4.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:12.1.5

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:13.1.1.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:8.1.7

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.2.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:11.6.4

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:4.14.54

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:lteversion:7.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:lteversion:6.0.1

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:3.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:gteversion:6.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:11.6.4

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.2.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.10

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-iq cloud and orchestrationscope:eqversion:1.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:eqversion:4.4.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.7

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:14.1.0.6

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:8.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:eqversion:4.6.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:12.1.5

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:8.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.1.23

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:gteversion:5.0.0

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:8.0.16

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:14.1.0.6

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:14.0.1.1

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:ltversion:13.1.1.5

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:12.1.5

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:3.10.102

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.2.1

Trust: 1.0

vendor:f5model:iworkflowscope:lteversion:2.3.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:12.1.5

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.10.12

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.10.15

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.10.11

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.10.13

Trust: 0.6

vendor:linuxmodel:kernelscope:eqversion:3.10.16

Trust: 0.6

sources: CNNVD: CNNVD-201809-1129 // NVD: CVE-2018-14634

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14634
value: HIGH

Trust: 1.0

secalert@redhat.com: CVE-2018-14634
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201809-1129
value: HIGH

Trust: 0.6

VULMON: CVE-2018-14634
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-14634
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2018-14634
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 2.0

sources: VULMON: CVE-2018-14634 // CNNVD: CNNVD-201809-1129 // NVD: CVE-2018-14634 // NVD: CVE-2018-14634

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.0

sources: NVD: CVE-2018-14634

THREAT TYPE

local

Trust: 0.8

sources: PACKETSTORM: 149633 // PACKETSTORM: 149634 // CNNVD: CNNVD-201809-1129

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201809-1129

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2018-14634

PATCH

title:The Registerurl:https://www.theregister.co.uk/2018/09/29/security_roundup_290918/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2018/09/27/mutagen_astronomy_linux/

Trust: 0.2

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183643 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182748 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182763 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182846 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183591 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182933 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183586 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182925 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182924 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3779-1

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183540 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20183590 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1087url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2018-1087

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1087url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2018-1087

Trust: 0.1

title:Red Hat: CVE-2018-14634url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-14634

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3775-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3775-1

Trust: 0.1

title:Palo Alto Networks Security Advisory: url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=ce1b094052412f92d362f6175160f203

Trust: 0.1

title:Palo Alto Networks Security Advisory: CVE-2018-14634 Privilege Escalation in PAN-OSurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=40221837cf076c147b7fb58374f34a5c

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=9cdc94827c3dfc5c8e263fb3b6e6be44

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=07ab17c2d7ba0de54dd1d1406e963124

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=9cb9a8ed428c6faca615e91d2f1a216d

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerabilities in the Linux Kernel affect PowerKVMurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3e8fb0a522dbdc0368aab05e3c3fb62c

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2018-14634

Trust: 0.1

title:secmon-probesurl:https://github.com/ARGOeu/secmon-probes

Trust: 0.1

title: - url:https://github.com/ARGOeu-Metrics/secmon-probes

Trust: 0.1

title:Localroot-Compileurl:https://github.com/ebrahimghiasi/Localroot-Compile

Trust: 0.1

title:Localroot_Compileurl:https://github.com/anoaghost/Localroot_Compile

Trust: 0.1

title:linux-kernel-exploitationurl:https://github.com/vahalen/linux-kernel-exploitation

Trust: 0.1

title:linux-kernel-exploitationurl:https://github.com/TamilHackz/linux-kernel-exploitation

Trust: 0.1

title:CVE-POCurl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

title:Exp101tsArchiv30thersurl:https://github.com/nu11secur1ty/Exp101tsArchiv30thers

Trust: 0.1

title: - url:https://github.com/lnick2023/nicenice

Trust: 0.1

title:awesome-cve-poc_qazbnm456url:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

sources: VULMON: CVE-2018-14634

EXTERNAL IDS

db:NVDid:CVE-2018-14634

Trust: 2.5

db:EXPLOIT-DBid:45516

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/07/20/2

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2018/09/25/4

Trust: 1.7

db:BIDid:105407

Trust: 1.7

db:AUSCERTid:ESB-2018.3220.3

Trust: 0.6

db:AUSCERTid:ESB-2019.2341

Trust: 0.6

db:AUSCERTid:ESB-2019.1800

Trust: 0.6

db:AUSCERTid:ESB-2019.0726

Trust: 0.6

db:AUSCERTid:ESB-2018.3220.4

Trust: 0.6

db:CNNVDid:CNNVD-201809-1129

Trust: 0.6

db:VULMONid:CVE-2018-14634

Trust: 0.1

db:PACKETSTORMid:149539

Trust: 0.1

db:PACKETSTORMid:150317

Trust: 0.1

db:PACKETSTORMid:150416

Trust: 0.1

db:PACKETSTORMid:149633

Trust: 0.1

db:PACKETSTORMid:149832

Trust: 0.1

db:PACKETSTORMid:150315

Trust: 0.1

db:PACKETSTORMid:149641

Trust: 0.1

db:PACKETSTORMid:149634

Trust: 0.1

sources: VULMON: CVE-2018-14634 // PACKETSTORM: 149539 // PACKETSTORM: 150317 // PACKETSTORM: 150416 // PACKETSTORM: 149633 // PACKETSTORM: 149832 // PACKETSTORM: 150315 // PACKETSTORM: 149641 // PACKETSTORM: 149634 // CNNVD: CNNVD-201809-1129 // NVD: CVE-2018-14634

REFERENCES

url:http://www.securityfocus.com/bid/105407

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2018:3643

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2018:2748

Trust: 1.8

url:https://www.exploit-db.com/exploits/45516/

Trust: 1.8

url:https://usn.ubuntu.com/3779-1/

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2925

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3591

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3590

Trust: 1.8

url:https://www.openwall.com/lists/oss-security/2018/09/25/4

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-14634

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2763

Trust: 1.7

url:https://usn.ubuntu.com/3775-2/

Trust: 1.7

url:https://usn.ubuntu.com/3775-1/

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2846

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2933

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2924

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3586

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3540

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20190204-0002/

Trust: 1.7

url:https://security.paloaltonetworks.com/cve-2018-14634

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/07/20/2

Trust: 1.7

url:https://support.f5.com/csp/article/k20934447?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2018-14634

Trust: 1.1

url:https://access.redhat.com/security/vulnerabilities/mutagen-astronomy

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2018-14634

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-14634

Trust: 0.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1624498

Trust: 0.6

url:https://support.f5.com/csp/article/k20934447?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://securityadvisories.paloaltonetworks.com/home/detail/143

Trust: 0.6

url:https://support.f5.com/csp/article/k20934447?utm_source=f5support&%3butm_medium=rss

Trust: 0.6

url:https://support.f5.com/csp/article/k20934447

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10883258

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2018.3220.3/

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10881053

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872470

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76682

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2341/

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10881424

Trust: 0.6

url:https://www.auscert.org.au/bulletins/70358

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1800/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-14633

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-18344

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-18344

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-15572

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-6554

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-6555

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-15594

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3775-1

Trust: 0.2

url:https://access.redhat.com/articles/3553061

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-10675

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-5391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-5391

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-10675

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/190.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2018-14634

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=58964

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/articles/3588731

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-160.210

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3779-1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3775-2

Trust: 0.1

sources: VULMON: CVE-2018-14634 // PACKETSTORM: 149539 // PACKETSTORM: 150317 // PACKETSTORM: 150416 // PACKETSTORM: 149633 // PACKETSTORM: 149832 // PACKETSTORM: 150315 // PACKETSTORM: 149641 // PACKETSTORM: 149634 // CNNVD: CNNVD-201809-1129 // NVD: CVE-2018-14634

CREDITS

Qualys Research Labs.

Trust: 0.6

sources: CNNVD: CNNVD-201809-1129

SOURCES

db:VULMONid:CVE-2018-14634
db:PACKETSTORMid:149539
db:PACKETSTORMid:150317
db:PACKETSTORMid:150416
db:PACKETSTORMid:149633
db:PACKETSTORMid:149832
db:PACKETSTORMid:150315
db:PACKETSTORMid:149641
db:PACKETSTORMid:149634
db:CNNVDid:CNNVD-201809-1129
db:NVDid:CVE-2018-14634

LAST UPDATE DATE

2026-02-01T20:56:53.871000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2018-14634date:2023-02-13T00:00:00
db:CNNVDid:CNNVD-201809-1129date:2023-03-23T00:00:00
db:NVDid:CVE-2018-14634date:2026-01-27T15:55:15.890

SOURCES RELEASE DATE

db:VULMONid:CVE-2018-14634date:2018-09-25T00:00:00
db:PACKETSTORMid:149539date:2018-09-25T22:59:18
db:PACKETSTORMid:150317date:2018-11-14T01:36:16
db:PACKETSTORMid:150416date:2018-11-21T02:05:07
db:PACKETSTORMid:149633date:2018-10-02T03:33:00
db:PACKETSTORMid:149832date:2018-10-17T15:42:22
db:PACKETSTORMid:150315date:2018-11-14T01:33:23
db:PACKETSTORMid:149641date:2018-10-02T20:02:00
db:PACKETSTORMid:149634date:2018-10-02T04:44:00
db:CNNVDid:CNNVD-201809-1129date:2018-09-26T00:00:00
db:NVDid:CVE-2018-14634date:2018-09-25T21:29:00.390