CVE-2018-9568 is memory corruption due to incorrect socket cloning; and CVE-2019-11810 is a NULL pointer dereference found in drivers/ scsi/ megarid/ megarid _ as _ base. c, which can cause a denial of service problem.
This update also fixed two errors that affect the performance of the Linux kernel on Red Hat Enterprise Linux 6 and CentOS Linux 6 systems, namely, the fragmentation packet timeout problem and the back-end TCP follow-up of the small buffer. If you install a new kernel version for the operating system, you can correct these two errors.
If you are using the Red Hat Enterprise Linux 6 or the CentOS Linux 6 operating system family, install the Linux kernel package on the 32-bit machine to the kernel-2.6.32-754.22.1.el6.i686.rpm, and install the kernel-2.6.32-754.22.1.el6.x86_64.rpm. on the 64-bit computer after the new Linux kernel version is installed. Remember to restart the system so that all changes take effect.
本次Linux内核安全更新适用于Red Hat Enterprise Linux Server 6(x86_64和i386)；Red Hat Enterprise Linux Workstation 6(x86_64和i386)；Red Hat Enterprise Linux Desktop 6(x86_64和i386)；面向IBM z Systems的Red Hat Enterprise Linux 6(s390x),Red Hat Enterprise Linux for Power,big endian 6(ppc64),Red Hat Enterprise Linux for Scientific Computing 6(x86_64)和CentOS Linux 6(x86_64和i386).