{
  "threat_severity" : "Low",
  "public_date" : "2017-06-19T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: Incorrectly mapped contents of PIE executable",
    "id" : "1462165",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1462165"
  },
  "cvss3" : {
    "cvss3_base_score" : "2.9",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
    "status" : "verified"
  },
  "details" : [ "The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected." ],
  "statement" : "This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw.  This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2.  This issue is currently fixed in most versions of shipping products.",
  "acknowledgement" : "Red Hat would like to thank Qualys Inc for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5 Extended Lifecycle Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1482",
    "cpe" : "cpe:/o:redhat:rhel_els:5",
    "package" : "kernel-0:2.6.18-420.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1486",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-696.3.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.2 Advanced Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1491",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:6.2",
    "package" : "kernel-0:2.6.32-220.72.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Advanced Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1490",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.4",
    "package" : "kernel-0:2.6.32-358.79.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Advanced Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1489",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.5",
    "package" : "kernel-0:2.6.32-431.80.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Telco Extended Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1489",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.5",
    "package" : "kernel-0:2.6.32-431.80.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Advanced Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1488",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.6",
    "package" : "kernel-0:2.6.32-504.60.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1488",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.6",
    "package" : "kernel-0:2.6.32-504.60.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1487",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "kernel-0:2.6.32-573.42.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-06-28T00:00:00Z",
    "advisory" : "RHSA-2017:1616",
    "cpe" : "cpe:/a:redhat:rhel_extras_rt:7",
    "package" : "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-06-20T00:00:00Z",
    "advisory" : "RHSA-2017:1484",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-514.21.2.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-08-01T00:00:00Z",
    "advisory" : "RHSA-2017:1842",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-693.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.2 Extended Update Support",
    "release_date" : "2017-06-19T00:00:00Z",
    "advisory" : "RHSA-2017:1485",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.2",
    "package" : "kernel-0:3.10.0-327.55.2.el7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2017-06-28T00:00:00Z",
    "advisory" : "RHSA-2017:1647",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-1:3.10.0-514.rt56.228.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel-alt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-1000379\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-1000379\nhttps://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" ],
  "name" : "CVE-2017-1000379",
  "csaw" : false
}