Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:1489 - Security Advisory
Issued:
2017-06-19
Updated:
2017-06-19

RHSA-2017:1489 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)

Red Hat would like to thank Qualys Research Labs for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64
  • Red Hat Enterprise Linux Server - TUS 6.5 x86_64

Fixes

  • BZ - 1461333 - CVE-2017-1000364 kernel: heap/stack gap jumping via unbounded stack allocations

CVEs

  • CVE-2017-1000364
  • CVE-2017-1000379

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/stackguard
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.80.2.el6.src.rpm SHA-256: f9caf7b2a66d8f3246d1f1cafc8dabb53fa34b667bf84f1e54544bbf9dc61052
x86_64
kernel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: b241570e13d8890cca7fce1d332cb616d50b0e01549d3a5db35d1dd3d9a3cdb7
kernel-abi-whitelists-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 7e469d4d6deef72a30d58ee291bbf55cee394b117d0008ece1c24c8d1b5e7ec2
kernel-debug-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 8fac43f2edad3ea2c82baffdfde5d88cd2c3f6bc8f9a048672f03afc9ad77b23
kernel-debug-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 70312c3134e8f8a6ab07b4eb57366dc802d676ae6af3022497b80269e1c15661
kernel-debug-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 70312c3134e8f8a6ab07b4eb57366dc802d676ae6af3022497b80269e1c15661
kernel-debug-devel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96397c1c3d2ab349cf2dcf54a1d25c585f4df8502e5e655a787d837858aec6f7
kernel-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96a100c9caa99704c96c0861d7780851879dc394419e0daa744cefe33be22403
kernel-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96a100c9caa99704c96c0861d7780851879dc394419e0daa744cefe33be22403
kernel-debuginfo-common-x86_64-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 855c62881b905fb683a2f566a535618e1312b37b4ff0955e8840697f591da1cf
kernel-debuginfo-common-x86_64-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 855c62881b905fb683a2f566a535618e1312b37b4ff0955e8840697f591da1cf
kernel-devel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7275b69b41834e7c1318166b01fc024b1345c8820df1f01f7f4f9730c280e47f
kernel-doc-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 2866b311e4c9956f1d55c94e250156a499cd17e952f98126328bc3b49fdb6026
kernel-firmware-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 3ce36d43d60353b112486d04059aa95a2ca1848e9972f1865b2451b2075d8938
kernel-headers-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: d54ac6923698c083617350498aa935f6ae05a851a0eb491e6d690997dbfcad1e
perf-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 550378938612676c64481dcba224cc8ffc75657187c06add69ec4e9cdaac5a62
perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7b5fc02e6acb9ae3a301aef2529105e3e30f2556898625f236cb712419011b9e
perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7b5fc02e6acb9ae3a301aef2529105e3e30f2556898625f236cb712419011b9e
python-perf-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: c89ef25b92a5c8649b7ce8db6da55ab40e106aa7c6233313c90e6d28e01a471f
python-perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 5a633c75576263d87dde6751d3fdb812a0b4d0baf3f2be3ee76c8254f439a970
python-perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 5a633c75576263d87dde6751d3fdb812a0b4d0baf3f2be3ee76c8254f439a970

Red Hat Enterprise Linux Server - TUS 6.5

SRPM
kernel-2.6.32-431.80.2.el6.src.rpm SHA-256: f9caf7b2a66d8f3246d1f1cafc8dabb53fa34b667bf84f1e54544bbf9dc61052
x86_64
kernel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: b241570e13d8890cca7fce1d332cb616d50b0e01549d3a5db35d1dd3d9a3cdb7
kernel-abi-whitelists-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 7e469d4d6deef72a30d58ee291bbf55cee394b117d0008ece1c24c8d1b5e7ec2
kernel-debug-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 8fac43f2edad3ea2c82baffdfde5d88cd2c3f6bc8f9a048672f03afc9ad77b23
kernel-debug-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 70312c3134e8f8a6ab07b4eb57366dc802d676ae6af3022497b80269e1c15661
kernel-debug-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 70312c3134e8f8a6ab07b4eb57366dc802d676ae6af3022497b80269e1c15661
kernel-debug-devel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96397c1c3d2ab349cf2dcf54a1d25c585f4df8502e5e655a787d837858aec6f7
kernel-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96a100c9caa99704c96c0861d7780851879dc394419e0daa744cefe33be22403
kernel-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 96a100c9caa99704c96c0861d7780851879dc394419e0daa744cefe33be22403
kernel-debuginfo-common-x86_64-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 855c62881b905fb683a2f566a535618e1312b37b4ff0955e8840697f591da1cf
kernel-debuginfo-common-x86_64-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 855c62881b905fb683a2f566a535618e1312b37b4ff0955e8840697f591da1cf
kernel-devel-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7275b69b41834e7c1318166b01fc024b1345c8820df1f01f7f4f9730c280e47f
kernel-doc-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 2866b311e4c9956f1d55c94e250156a499cd17e952f98126328bc3b49fdb6026
kernel-firmware-2.6.32-431.80.2.el6.noarch.rpm SHA-256: 3ce36d43d60353b112486d04059aa95a2ca1848e9972f1865b2451b2075d8938
kernel-headers-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: d54ac6923698c083617350498aa935f6ae05a851a0eb491e6d690997dbfcad1e
perf-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 550378938612676c64481dcba224cc8ffc75657187c06add69ec4e9cdaac5a62
perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7b5fc02e6acb9ae3a301aef2529105e3e30f2556898625f236cb712419011b9e
perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 7b5fc02e6acb9ae3a301aef2529105e3e30f2556898625f236cb712419011b9e
python-perf-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: c89ef25b92a5c8649b7ce8db6da55ab40e106aa7c6233313c90e6d28e01a471f
python-perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 5a633c75576263d87dde6751d3fdb812a0b4d0baf3f2be3ee76c8254f439a970
python-perf-debuginfo-2.6.32-431.80.2.el6.x86_64.rpm SHA-256: 5a633c75576263d87dde6751d3fdb812a0b4d0baf3f2be3ee76c8254f439a970

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility