SB2018111336 - Red Hat update for kernel
Published: November 13, 2018 Updated: January 27, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2017-18344)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to out-of-bounds memory read error in the 'sigevent->sigev_notify' field of show_timer() function in the timer subsystem. A local attacker can obtain potentially sensitive information from system memory.
2) Improper input validation (CVE-ID: CVE-2018-5391)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to an error when handling reassembly of fragmented IPv4 and IPv6 packets. A remote attacker can send specially crafted packets, trigger time and calculation expensive fragment reassembly algorithms and cause the service to crash.
3) Use-after-free error (CVE-ID: CVE-2018-10675)
The weakness exists in the do_get_mempolicy function in mm/mempolicy.c due to use-after-free error. A local attacker can use specially crafted system calls, trigger memory corruption and cause the service to crash.
4) Integer overflow (CVE-ID: CVE-2018-14634)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in create_elf_tables() function when processing SUID binaries. A local unprivileged user can use this vulnerability to execute execute arbitrary code on the system with elevated privileges.
Remediation
Install update from vendor's website.