Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:1483 - Security Advisory
Issued:
2017-06-19
Updated:
2017-06-19

RHSA-2017:1483 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long
Life.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

  • A flaw was found in the way memory was being allocated on the stack for user

space binaries. If heap (or different memory region) and stack memory regions
were adjacent to each other, an attacker could use this flaw to jump over the
stack guard gap, cause controlled memory corruption on process stack or the
adjacent memory region, and thus increase their privileges on the system. This
is a kernel-side mitigation which increases the stack guard gap size from one
page to 1 MiB to make successful exploitation of this issue more difficult.
(CVE-2017-1000364, Important)

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 1461333 - CVE-2017-1000364 kernel: heap/stack gap jumping via unbounded stack allocations

CVEs

  • CVE-2017-1000364

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/stackguard
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.33.2.el5.src.rpm SHA-256: 88017d09decc1aa9f886e85bc38900697be00666fcd5d3d7faec09d736ccb935
x86_64
kernel-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 78f904be8bba8b1e745d323ac6044db7b33f0d134ff4120429abd890861414c5
kernel-debug-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 8267f040f481ef32b7ab4fccd643a9ded7b7a390af83d5ff203707db7ae6117e
kernel-debug-debuginfo-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 730e611c1432e7e69853794046d9dc75c610d36794cf46fd8e9182b2321bef48
kernel-debug-devel-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 85faa7c455ef1e5978e6748f8cddd0f0ae2daceb07fb9b2dac36729bf771423e
kernel-debuginfo-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: e47b2111da00314a6949e86ab375438f2bb85232b5ab2992c094ac1108d13420
kernel-debuginfo-common-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: ab518fe4d1ab9e0d436047321a15e95fc39e5b389635fd8138e46352b063ef6b
kernel-devel-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: e504273dc14eee8b8d5229c000fe191e0df904f57f9d921ad27001e52c3e879a
kernel-doc-2.6.18-348.33.2.el5.noarch.rpm SHA-256: c227b2ff5fca65c132da1a2387e1eaa97cf70058abab862edd67e9917f8dcbae
kernel-headers-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 767819ad4e068bc65f06b5f64449052e40b8536e49f4bc4b7875c0f436edeb11
kernel-xen-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 5cbc38c3d58ccc09299ea454675777b45905fe8049e3e8eec6ff9f00191e12cd
kernel-xen-debuginfo-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 6204390d04281744665d5458d73dae23ea4c6b41e01f641500c8b7cccfc47e03
kernel-xen-devel-2.6.18-348.33.2.el5.x86_64.rpm SHA-256: 5a65717decb382eeae3c7c52f1b6e27d5e38d5df69745f1ae7e9849d50677ea7
ia64
kernel-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 45bb008be47822e4a97d299afe546f885aa4e7c6e1668412fc07b21476369243
kernel-debug-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 3d116a4c13ec11c21eac69a3d2a0d61527efb78a3997c6e9380784f166cc9ef3
kernel-debug-debuginfo-2.6.18-348.33.2.el5.ia64.rpm SHA-256: de260e73bfa8e48d43f362a06132c8b4b9712cf423af8218ec09e4f2d5df7f50
kernel-debug-devel-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 5cbd4773dc58d06ad3da306b994738ab1e8c159636f9d4c00a45ddf75a353cb6
kernel-debuginfo-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 598a410d043cbd7af27dfe0905e1de95c59dcb1909bab71500910c4ceddbf5a9
kernel-debuginfo-common-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 317e532ae74ee8067e25d9294c82ec8306496dd4a6dd6c85ddd960c2f03e7a39
kernel-devel-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 9c2539e09fa3edd5437e4a3a20ef30d4050c3f97487c650971173830bbf70574
kernel-doc-2.6.18-348.33.2.el5.noarch.rpm SHA-256: c227b2ff5fca65c132da1a2387e1eaa97cf70058abab862edd67e9917f8dcbae
kernel-headers-2.6.18-348.33.2.el5.ia64.rpm SHA-256: e374d2936cf400b3a01977c44f33ff725db2c58b8b750623859b8279022827a1
kernel-xen-2.6.18-348.33.2.el5.ia64.rpm SHA-256: ba2fd016f0354e64b4c6c839ba035c4ec8fa08b2e63819ae7f5e2adc63da0991
kernel-xen-debuginfo-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 7b52ce1f4a19b9227070e697a4e49017c6b945e8622d2bdac5f862f677315900
kernel-xen-devel-2.6.18-348.33.2.el5.ia64.rpm SHA-256: 6df577ddb20da80d2ce7ec26326736218fea038e5cf315a002ffc9761b869182
i386
kernel-2.6.18-348.33.2.el5.i686.rpm SHA-256: 5c55df0f75b3e164047b42c5231eb4b2c0ed8568a6ec20646679fc06e2b0102c
kernel-PAE-2.6.18-348.33.2.el5.i686.rpm SHA-256: 442ba450360d4247962db88d528073b423af77b1e1d29db156aa265c76de86da
kernel-PAE-debuginfo-2.6.18-348.33.2.el5.i686.rpm SHA-256: d367f9bb0d52d33b6f9a50ad5dd7e11bcb715ecbdff8d9830281e70b8f8fe6e1
kernel-PAE-devel-2.6.18-348.33.2.el5.i686.rpm SHA-256: 7f7498f17d27ab15c668173af89fe3ef1e4828b4094f60ffc703c935054d19ce
kernel-debug-2.6.18-348.33.2.el5.i686.rpm SHA-256: f53418b55a5d1869c6866313f3e24085b4a6f476f34b592cb0d2b11138c5b89f
kernel-debug-debuginfo-2.6.18-348.33.2.el5.i686.rpm SHA-256: c241a906ef82a7f7e778b8b4f44a1c1dca2abfb6fa3f1b444713580a07759374
kernel-debug-devel-2.6.18-348.33.2.el5.i686.rpm SHA-256: 794d6ce570c5377748d261a89defbc4da73699f81de7286c60049401a22cfac3
kernel-debuginfo-2.6.18-348.33.2.el5.i686.rpm SHA-256: 2600350c735ec514cc761a2373ef268bfb7d31af0dbf7e2ff8502549d65d3fac
kernel-debuginfo-common-2.6.18-348.33.2.el5.i686.rpm SHA-256: d726c04e66c60114056f628c3507ea6b5e4dfc724b1f53aab315fed56cbd41e2
kernel-devel-2.6.18-348.33.2.el5.i686.rpm SHA-256: 227dcbc1be0cbe2c47bf0f9a43aee5cf856bd2b2a621897d9739ee01c2e151da
kernel-doc-2.6.18-348.33.2.el5.noarch.rpm SHA-256: c227b2ff5fca65c132da1a2387e1eaa97cf70058abab862edd67e9917f8dcbae
kernel-headers-2.6.18-348.33.2.el5.i386.rpm SHA-256: 26423e592d4f7f502040c80483717bfb82aef456d3d01b9d43b7c935de652bf1
kernel-xen-2.6.18-348.33.2.el5.i686.rpm SHA-256: c122cd3e362698fbc85b81e05bc1a975698c69a012131bc6a12985deca1b151c
kernel-xen-debuginfo-2.6.18-348.33.2.el5.i686.rpm SHA-256: eb090abe3e92e6932656ca014c0008cc05c4fabf2677ecce23bf4425598d43a4
kernel-xen-devel-2.6.18-348.33.2.el5.i686.rpm SHA-256: bf81aa630e6304d0006b7289888e48df6a5ea9f426c899b43ed548094202f70a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter