Synopsis: Important: kernel security update Advisory ID: SLSA-2016:2047-1 Issue Date: 2016-10-10 CVE Numbers: CVE-2016-7039 -- Security Fix(es): * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important) -- SL7 x86_64 kernel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.36.2.el7.x86_64.rpm kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm perf-3.10.0-327.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm python-perf-3.10.0-327.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm kernel-doc-3.10.0-327.36.2.el7.noarch.rpm - Scientific Linux Development Team