kernel (SL7)

Synopsis: Important: kernel security update
Advisory ID: SLSA-2016:2047-1
Issue Date: 2016-10-10
CVE Numbers: CVE-2016-7039

Security Fix(es):

* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR
Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent
Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow
issue. It could occur while receiving large packets via GRO path as an
unlimited recursion could unfold in both VLAN and TEB modules leading to a
stack corruption in the kernel. (CVE-2016-7039, Important)

SL7
x86_64
kernel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm
kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm
kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm
perf-3.10.0-327.36.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm
python-perf-3.10.0-327.36.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm
noarch
kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm
kernel-doc-3.10.0-327.36.2.el7.noarch.rpm

– Scientific Linux Development Team