Important CentOS kernel Security Update
|kernel-3.10.0-327.36.2.el7.src.rpm, kernel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm, kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm, kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-doc-3.10.0-327.36.2.el7.noarch.rpm, kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm, perf-3.10.0-327.36.2.el7.x86_64.rpm, python-perf-3.10.0-327.36.2.el7.x86_64.rpm|
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Please see https://www.redhat.com/footer/terms-of-use.html
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.Sign up for monitoring
Affected package information