Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2933 - Security Advisory
Issued:
2018-10-16
Updated:
2018-10-16

RHSA-2018:2933 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
  • A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
  • kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
  • kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.

Bug Fix(es):

  • Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630)
  • After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333)
  • Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64

Fixes

  • BZ - 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
  • BZ - 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
  • BZ - 1609664 - CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)
  • BZ - 1624498 - CVE-2018-14634 kernel: Integer overflow in Linux's create_elf_tables function

CVEs

  • CVE-2018-5390
  • CVE-2018-5391
  • CVE-2018-10675
  • CVE-2018-14634

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/articles/3553061
  • https://access.redhat.com/security/vulnerabilities/mutagen-astronomy
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.93.2.el6.src.rpm SHA-256: 7c614a0134e1699a233fd003db11e818302ba219b733fed6d1793320e0eec9cf
x86_64
kernel-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 1b92133fa29588228a1f92d778866b16010921fbcb7ae295296cb9d0745f62fc
kernel-abi-whitelists-2.6.32-431.93.2.el6.noarch.rpm SHA-256: 8c821253cc0139af8b0d8331fec637b9254104d408090f2596dee0195bdd46df
kernel-debug-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 88f48bfeb000ef3e9a05b16cf6de9b3b2a728c354446a2a1962e0347ea329a48
kernel-debug-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: a18147f11c566f01dccfe77e3cb0329b4470dfe1897797907d86db8ffe0394a5
kernel-debug-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: a18147f11c566f01dccfe77e3cb0329b4470dfe1897797907d86db8ffe0394a5
kernel-debug-devel-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: fe1638e738e04666925760a46b40de2176aa64447566732e8e203f72ea8a6167
kernel-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 90580ed20ad91df7f47c8b49bf4540a62cc26756808a4efe372472c0e7bf2f70
kernel-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 90580ed20ad91df7f47c8b49bf4540a62cc26756808a4efe372472c0e7bf2f70
kernel-debuginfo-common-x86_64-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 3bce345409501bcda779cd918acc144d201371a85cbb41e37abc02cf4eab418a
kernel-debuginfo-common-x86_64-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 3bce345409501bcda779cd918acc144d201371a85cbb41e37abc02cf4eab418a
kernel-devel-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 7ed6f6c232d61267e67bfe3178bf48b1aafb6993531bf929b908bf8b4f2f31f3
kernel-doc-2.6.32-431.93.2.el6.noarch.rpm SHA-256: 91c8e2eca5b1ad8b71e7b566a36c7d928b7bc6ddb53ae7c7544b62cff8666970
kernel-firmware-2.6.32-431.93.2.el6.noarch.rpm SHA-256: a0b3440b77bff8f71b2a024858f558e54ae1b93a906ea9bf7e77a8c8eaede0dd
kernel-headers-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 97f5311f3500c1079dffc4d89540b413b1f0d0c638f83905e4086a25272eee2a
perf-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: a4e953ea6e02358aec0e13e391584ed47175809cd824aa9529d59b03816d153c
perf-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 9d1841f7c012e60dbb961ab73eaedd82cfcfa77e4f84fb46fdc22a0654c4357f
perf-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 9d1841f7c012e60dbb961ab73eaedd82cfcfa77e4f84fb46fdc22a0654c4357f
python-perf-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 4b5ced956b264e7e5aad8e3cd2dde24b4b349756d8828683636f53cf30ac8c29
python-perf-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 685eef15ff38f25a5867557cd5b6420798fc47a63ac3184d825dec39af81bc6e
python-perf-debuginfo-2.6.32-431.93.2.el6.x86_64.rpm SHA-256: 685eef15ff38f25a5867557cd5b6420798fc47a63ac3184d825dec39af81bc6e

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility