SB2018101620 - Red Hat Enterprise Linux 6.5 Advanced Update Support update for kernel
Published: October 16, 2018 Updated: January 27, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Use-after-free error (CVE-ID: CVE-2018-10675)
The weakness exists in the do_get_mempolicy function in mm/mempolicy.c due to use-after-free error. A local attacker can use specially crafted system calls, trigger memory corruption and cause the service to crash.
2) Integer overflow (CVE-ID: CVE-2018-14634)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in create_elf_tables() function when processing SUID binaries. A local unprivileged user can use this vulnerability to execute execute arbitrary code on the system with elevated privileges.
3) Resource exhaustion (CVE-ID: CVE-2018-5390)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to the system uses an inefficient TCP reassembly algorithm. A remote attacker can send specially crafted packets within ongoing TCP sessions to consume excessive CPU resources and cause the service to crash.
Note: The issue has been called "SegmentSmack".
4) Improper input validation (CVE-ID: CVE-2018-5391)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to an error when handling reassembly of fragmented IPv4 and IPv6 packets. A remote attacker can send specially crafted packets, trigger time and calculation expensive fragment reassembly algorithms and cause the service to crash.
Remediation
Install update from vendor's website.