Ask the Community
Groups
CVE-2018-10675 kernel: Use-after-free vulnerability in mm/mempolicy.c:do_get_mempolicy - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2018-10675</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.<br><br>CVSS3 Base Score 7.8 High<br><br><br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Resolution:<br>Apply Unitrends security update v10.29 from 07/27/2018 or later,<br> containing kernel-2.6.32-754.2.1.el6</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2018-10675%250D%250Ahttps%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2018-10675%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Ferrata%2FRHSA-2018%3A2164">https://access.redhat.com/security/cve/cve-2018-10675 https://nvd.nist.gov/vuln/detail/CVE-2018-10675 https://access.redhat.com/errata/RHSA-2018:2164</a></li></ul> </article> </main>