<font size=2 color=#2f2f2f face="sans-serif">IBM BigFix Patch has released
Fixlets to address the Stack Clash Vulnerabilities for CVE 2017-1000364,
CVE 2017-1000366, and CVE-2017-1000367.</font><br><br><font size=2 color=#2f2f2f face="sans-serif">The Fixlets for these
CVEs are released in the following sites:</font><br><font size=2 color=#2f2f2f face="sans-serif">Patches for Oracle Linux
6 site, version 50<br>Patches for Oracle Linux 7 site, version 82</font><br><font size=2 color=#2f2f2f face="sans-serif">Patches for RHEL 6 - Native
Tools site, version 332<br>Patches for RHEL RHSM 6 on System Z site, version 38<br>Patches for RHEL 7 site, version 165<br>Patches for RHEL RHSM 7 on System Z site, version 26<br>Patches for RHEL 7 for IBM Power LE site, version 35<br>Patches for RHEL 7 for IBM Power BE site, version 5</font><br><font size=2 color=#2f2f2f face="sans-serif">Patches for SLE 11 Native
Tools site, version 196<br>Patches for SLE 11 on System z Native Tools site, version 26<br>Patches for SLE 12 Native Tools site, version 140</font><br><br><font size=2 color=#2f2f2f face="sans-serif"><b>Note</b>: BigFix is
unable to publish the Fixlets for some operating systems because the vendors
have not published the patches for these CVEs yet. BigFix will publish
the Fixlets for these operating systems as soon as the patches become available:<br>CentOS 6 and CentOS 7: CVE 2017-1000364, CVE 2017-1000366, and CVE-2017-1000367<br>Oracle Linux 6 and Oracle Linux 7: CVE-2017-1000367<br>SUSE Linux Enterprise Desktop 11: CVE 2017-1000364 and CVE 2017-1000366<br>SUSE Linux Enterprise Desktop/Server 11 and SUSE Linux Enterprise Server
11z: CVE-2017-1000367<br>Ubuntu 1404 and Ubuntu 1604 : CVE 2017-1000364, CVE 2017-1000366, and CVE-2017-1000367</font><br><br><font size=2 color=#2f2f2f face="sans-serif"><b>Actions to Take:</b><br>Given the serious nature of these vulnerabilities, it is advisable to upgrade
your systems immediately or apply the patch as soon as possible.</font><br><font size=2 color=#2f2f2f face="sans-serif">No other action is required
after applying the Fixlets.</font><br><br><font size=2 color=#2f2f2f face="sans-serif"><b>Additional Information:</b><br>For more information, see the following sources:</font><font size=2 color=#4181c0 face="sans-serif"><br></font><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364"><font size=2 color=#4181c0 face="sans-serif">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364</font></a><font size=2 color=#4181c0 face="sans-serif"><br></font><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366"><font size=2 color=#4181c0 face="sans-serif">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366</font></a><font size=2 color=#4181c0 face="sans-serif"><br></font><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367"><font size=2 color=#4181c0 face="sans-serif">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367</font></a><br><br><font size=2 color=#2f2f2f face="sans-serif"><i>Application Engineering
team<br>IBM BigFix Patch</i></font><BR>