Important CentOS kernel Security Update

Metadata

high
7.8
kernel-3.10.0-327.36.2.el7.src.rpm, kernel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm, kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm, kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm, kernel-doc-3.10.0-327.36.2.el7.noarch.rpm, kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm, kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm, perf-3.10.0-327.36.2.el7.x86_64.rpm, python-perf-3.10.0-327.36.2.el7.x86_64.rpm
CVE-2016-7039
rhn.redhat.com, lists.centos.org
2016-10-11
2017-07-27 19:11
ALAS-2016-762
CVE-2016-7039 linux
CVE-2016-7039
2017-04-01 19:10
2017-01-05 20:14

Description


An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
7 kernel kernel-3.10.0-327.36.2.el7.src.rpm
kernel kernel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-abi-whitelists kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm
kernel-debug kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debug-devel kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-devel kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-doc kernel-doc-3.10.0-327.36.2.el7.noarch.rpm
kernel-headers kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-libs kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-libs-devel kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm
perf perf-3.10.0-327.36.2.el7.x86_64.rpm
python-perf python-perf-3.10.0-327.36.2.el7.x86_64.rpm